US20080260199A1 - Authenticity Verification Methods, Products and Apparatuses - Google Patents

Authenticity Verification Methods, Products and Apparatuses Download PDF

Info

Publication number
US20080260199A1
US20080260199A1 US11/660,073 US66007305A US2008260199A1 US 20080260199 A1 US20080260199 A1 US 20080260199A1 US 66007305 A US66007305 A US 66007305A US 2008260199 A1 US2008260199 A1 US 2008260199A1
Authority
US
United States
Prior art keywords
article
data points
paper
signature
class signature
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Abandoned
Application number
US11/660,073
Inventor
Russell Paul Cowburn
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Ingenia Holdings Ltd
Ingenia Technology Ltd
Original Assignee
Ingenia Technology Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Ingenia Technology Ltd filed Critical Ingenia Technology Ltd
Priority to US11/660,073 priority Critical patent/US20080260199A1/en
Publication of US20080260199A1 publication Critical patent/US20080260199A1/en
Assigned to INGENIA HOLDINGS LIMITED reassignment INGENIA HOLDINGS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COWBURN, RUSSELL PAUL
Assigned to INGENIA HOLDINGS LIMITED reassignment INGENIA HOLDINGS LIMITED ASSIGNMENT OF ASSIGNORS INTEREST (SEE DOCUMENT FOR DETAILS). Assignors: COWBURN, RUSSELL PAUL
Abandoned legal-status Critical Current

Links

Images

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K1/00Methods or arrangements for marking the record carrier in digital fashion
    • G06K1/12Methods or arrangements for marking the record carrier in digital fashion otherwise than by punching
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • G07D7/121Apparatus characterised by sensor details
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/08Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means
    • G06K19/10Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards
    • G06K19/14Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code using markings of different kinds or more than one marking of the same kind in the same record carrier, e.g. one marking being sensed by optical and the other by magnetic means at least one kind of marking being used for authentication, e.g. of credit or identity cards the marking being sensed by radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06KGRAPHICAL DATA READING; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K7/00Methods or arrangements for sensing record carriers, e.g. for reading patterns
    • G06K7/10Methods or arrangements for sensing record carriers, e.g. for reading patterns by electromagnetic radiation, e.g. optical sensing; by corpuscular radiation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V10/00Arrangements for image or video recognition or understanding
    • G06V10/40Extraction of image or video features
    • G06V10/42Global feature extraction by analysis of the whole pattern, e.g. using frequency domain transformations or autocorrelation
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06VIMAGE OR VIDEO RECOGNITION OR UNDERSTANDING
    • G06V20/00Scenes; Scene-specific elements
    • G06V20/80Recognising image objects characterised by unique random patterns
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/06Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency using wave or particle radiation
    • G07D7/12Visible light, infrared or ultraviolet radiation
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/2033Matching unique patterns, i.e. patterns that are unique to each individual paper
    • GPHYSICS
    • G07CHECKING-DEVICES
    • G07DHANDLING OF COINS OR VALUABLE PAPERS, e.g. TESTING, SORTING BY DENOMINATIONS, COUNTING, DISPENSING, CHANGING OR DEPOSITING
    • G07D7/00Testing specially adapted to determine the identity or genuineness of valuable papers or for segregating those which are unacceptable, e.g. banknotes that are alien to a currency
    • G07D7/20Testing patterns thereon
    • G07D7/202Testing patterns thereon using pattern matching
    • G07D7/206Matching template patterns

Definitions

  • the invention relates to security methods, more especially verification of authenticity of an article such as a personal identification (ID) card, banknote, vendable product, document or other item made from fibrous sheet material such as paper or cardboard.
  • ID personal identification
  • banknote banknote
  • vendable product document or other item made from fibrous sheet material such as paper or cardboard.
  • tokens are manufactured and measured in a set way to obtain a unique characteristic.
  • the characteristic can then be stored in a computer database, or otherwise retained.
  • Tokens of this type can be embedded in the carrier article, e.g. a banknote, passport, ID card, important document. Subsequently, the carrier article can be measured again and the measured characteristic compared with the characteristics stored in the database to establish if there is a match.
  • One physical effect that has been considered in a number of prior art documents [1-4] is to use laser speckle from intrinsic properties of an article, typically in the form of a special token, to provide a unique characteristic.
  • a large area such as the whole of a special token, is illuminated with a collimated laser beam and a significant solid angle portion of the resultant speckle pattern is imaged with a CCD, thereby obtaining a speckle pattern image of the illuminated area made up of a large array of data points.
  • a digital signature can be computed that is unique to the area of the article that has been scanned. This technique is capable of providing a unique signature from the surfaces of a wide variety of articles, including untreated paper, cardboard and plastic.
  • each perfume bottle box can be scanned by a reader to obtain a signature, and these signatures are entered into a master database.
  • the master database includes a signature from every article, i.e. box of perfume, produced. Later, for field verification, a reader can be used to scan any box of perfume to obtain a signature, and this signature is compared with the master database to establish whether there is a matching signature held in the master database. If there is no match, the article is considered to be counterfeit. If there is a match, then the article is considered to be genuine.
  • the number of signatures stored in the master database may be very large.
  • the number of entries may be perhaps millions, tens of millions or even hundreds of millions. For example, this would be the case if the scheme is used for passport or driving licence verification for a populous country.
  • the artefact signals themselves appear as one or more frequency components found in the output signal derived from a photodetector as the paper surface is scanned.
  • the period and number of the frequency components found any particular artefact signal depends upon the orientation of the scanning beam with respect to the paper surface.
  • the manufacturing source of the paper can be identified. Although this provides only a fairly low level of security on its own, it provides a useful technique for performing a negative test on authenticity, since a fail clearly indicates that the article cannot be genuine regardless of its unique individual signature.
  • this technique ensures that not every sheet of paper that is manufactured has to be scanned to provide a predetermined characteristic signature. This technique can thereby avoid or reduce the need for storage of a large data set of such predetermined characteristic signatures. Additionally, to obtain the class signature, paper can be scanned anywhere on its surface. This helps reduce the need for accurate registration of an article being scanned with a scanning beam.
  • an apparatus for analysing an article made of paper or cardboard placed in a reading volume comprises a scanner for scanning an article with an optical beam, a detector arrangement for collecting a set of data points from signals obtained when the beam scans the reading volume, and a data acquisition and processing module for processing the set of data points so as to determine whether the article possesses a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article. Different ones of the data points relate to signals obtained at different times during the scan.
  • the source is mounted to direct the coherent beam towards the reading volume so that the coherent beam will strike an article with near normal incidence.
  • the scanner is configured to project the beam towards the article at near normal incidence.
  • Periodic variations in the intrinsic properties of the article may give rise to an artefact signal that can be used to provide a class signature.
  • the class signature is obtained by performing a mathematical transform of the set of data points to determined the class signature. A match between the measured class signature and a predetermined class signature is then indicative that the article is of the generic type associated with the class of the predetermined class signature.
  • one or more Fourier Transformations (FTs) of the set of data points are calculated in order to identify an artefact signal. The PT spectrum, or one or more peaks of it, can then be used as the class signature.
  • FTs Fourier Transformations
  • Selected subsets of the set of data points may also be analysed. For example, such subsets may be analysed in order to determine which subset gives rise to the largest amplitude peak in a transformed set of data points.
  • Such subsets may include data points that correspond to scans performed on an article at various orientations.
  • a subset may comprise data points obtained over an arc forming part of a rotational scan.
  • Predetermined class signatures may be provided in a database that can be remotely located or included in a hand-held reader. Since the apparatus uses class signatures, the database can be relatively small. The predetermined class signatures can also be encrypted for enhanced security. By matching class signatures to predetermined class signatures, apparatus incorporating this feature can provide initial security screening of articles made of paper/card according to manufacturer/machine etc. For example, the apparatus can indicate to an operator that an article is not made of US passport paper, not made of UK banknote paper etc.
  • the apparatus may additionally comprise an encoder/decoder module for measuring the relative position of the beam and the article during the scan.
  • the data acquisition and processing module may also be further operable to linearise the set of data points prior to determining a class signature by using relative measured position information obtained from the encoder/detector module.
  • the detector arrangement may include a plurality of detector channels arranged and configured to sense scatter from respective different parts of the reading volume. Each such detector channel can provide a set of time sequence (or, equivalently, linear scan position sequence) data that is used to determine a respective class signature.
  • Two or more such respective class signatures can be averaged to provide a measurement of the class signature having an improved signal to noise ratio. Since multiple detectors are used in various embodiments for determining unique characteristic responses, incorporation of averaging functionality does not significantly increase the cost or complexity of the apparatus.
  • different ones of the data points are obtained by linear scanning of the beam in the reading volume.
  • Scanning entails relative movement between the beam and the reading volume.
  • Use of a linear scan is beneficial as it is mechanically simple and relatively inexpensive to implement.
  • a linear scan is also useful where the orientation of imprints that give rise to a class signature is predetermined (for example, where paper is always cut in a particular way with respect to the screen on which it is manufactured).
  • Linear scans are generally relatively fast when determining a class signature, since the set of data points that is generated only requires minimal processing in order to extract that class signature.
  • different ones of the data points are obtained by rotational scanning of the beam in the reading volume.
  • rotational scanning is performed using a portable hand-held scanner, such a scanner may be placed anywhere on the article.
  • Hand-held scanners of this type are thus of use to personnel, such as customs officers, who may need to perform a rapid in situ scan of a sample set articles from a large consignment of articles.
  • Various embodiments of the invention are operable to perform both a scan to verify a class signature and a scan to verify a unique characteristic signature. Verification of a characteristic signature may conditionally follow verification of the class signature or may be mandatory.
  • a method of analysing an article made of paper or cardboard comprises placing an article in a reading volume, scanning the article with an optical beam, collecting a set of data points from signals obtained when the beam scans the reading volume, and processing the set of data points to determine whether the article possesses a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article. Different ones of the data points relate to signals obtained at different times during the scan.
  • the method according to this aspect of the invention may further comprise method steps for performing one or more functions/operations that may be implemented or provided by the apparatus according to the first aspect of the invention, herein described.
  • the apparatus according to the first aspect of the invention may be used to implement the method according to the second aspect of the invention.
  • the apparatus according to the first aspect of the invention may be used to verify authenticity of an article by performing a method of analysing the article.
  • the apparatus may be used to check whether a particular article has an expected class signature.
  • a perfume box has a class signature derived from an artefact signal arising from an imprint of a rectangular grid with 250 ⁇ 400 micrometre spacing, or that a banknote has a class signature derived from an artefact signal arising from an imprint of an equal-sided hexagonal grid with 300 micrometre parallel side separation.
  • class signatures that derive from complex-shaped imprints.
  • class signatures may derive from imprints that are heart-shaped, star-shaped, etc.
  • the apparatus may be used to recover information that is deliberately encoded into paper/cardboard by imprinting a predetermined pattern. Such a pattern need not be visible.
  • information may be recovered from the class signature which is encoded into the paper by way of a bespoke screen used during paper manufacture.
  • a screen for manufacturing a paper or cardboard article comprising a plurality of elements arranged and configured to impart a bespoke imprint pattern to a paper or cardboard article for providing a predetermined class signature that identifies the article as being of a known generic type.
  • the screen is for the deliberate imparting of the imprint to the article so as to provide a predetermined class signature.
  • the screen is a bespoke screen that provides imprints whose pattern is not currently found in screens used in the paper making industry. Such bespoke screens may further provide complex-shaped imprint patterns.
  • this aspect relates to the deliberate imparting of an imprint to the article so as to provide a predetermined class signature.
  • the screen may be any means that imparts a desired imprint to the paper or cardboard during or after it is manufactured.
  • the screen can be a perforated surface or may be composed of plates, wires etc.
  • a conventional screen comprises elements that are spatially arranged so as to impart a periodic imprint pattern to the paper or cardboard.
  • a scan to determine the class signature can be performed anywhere on the paper.
  • Such a periodic imprint pattern also provides the data points with a strong frequency component that is suitable for detection using FT or other analysis techniques.
  • the spatial modulation may be used to encode data such as, for example, binary data bits.
  • Spatial modulation may, for example, by provided to encode data using chirped modulation, super-periodicity modulation, amplitude modulation, phase shift keying modulation, or frequency shift keying modulation.
  • the imprint pattern can incorporate complex shapes. For example, asymmetric shapes such as stars, hearts etc. or shapes having various varying degrees of symmetry may be incorporated to provide multiple frequency components into an artefact signal. Use of complex multiple frequency components for class signature recognition makes copying harder and also increases the number of possible class signatures that can be recognised.
  • One or more bit sequences may also be encoded into the paper or cardboard by using the imprint pattern for encoding. This provides numerous possibilities for incorporating information into the paper or cardboard. For example, information identifying a manufacturer, the machine the paper was made on, encrypted information relating to the expected class signature etc. can be encoded within the paper itself. Moreover, as previously indicated, this information can be robustly and invisibly stored.
  • a method of making a paper or cardboard article including a bespoke imprint pattern comprises using a screen according to the third aspect of the invention to impart a bespoke imprint pattern.
  • a paper or cardboard article comprising a bespoke imprint pattern for providing a class signature for identifying the article as belonging to a known generic type.
  • the imprint pattern may not be visible.
  • the imprint pattern may not be visible to the naked eye.
  • the bespoke imprint pattern of the paper/cardboard may be periodic.
  • the imprint pattern incorporates spatial modulation provided according to one or more of the following schemes: chirped modulation, super-periodicity modulation, amplitude modulation, phase shift keying modulation, and frequency shift keying modulation. It is also possible to use an imprint pattern that encodes one or more bit sequences into the paper or cardboard
  • the main embodiments are described in relation to the Figures. These embodiments can be used to detect a class signature and optionally also a unique characteristic signature.
  • the detector channels may be made up of discrete detector components in the form of simple phototransistors when a characteristic signature is to be detected. Other simple discrete components could be used such as PIN diodes or photodiodes. Integrated detector components, such as a detector array could also be used, although this would add to the cost and complexity of the devices.
  • the source so as to direct the beam onto the reading volume so that it will strike an article with near normal incidence.
  • near normal incidence means ⁇ 5, 10 or 20 degrees.
  • the beam can be directed to have oblique incidence on the articles. This will usually have a negative influence in the case that the beam is scanned over the article.
  • the detector arrangement is arranged in reflection to detect radiation back scattered from the reading volume.
  • the detectors could be arranged in transmission.
  • the data acquisition and processing module is operable to further analyse the data points to identify a signal component that follows a predetermined encoding protocol and to generate a predetermined characteristic signature therefrom.
  • the characteristic of the predetermined encoding protocol is envisaged to be based on contrast, i.e. scatter signal strength, in most embodiments.
  • a conventional bar code protocol may be used in which the bar code is printed or otherwise applied to the article in the form of stripes in the case of a ID barcode or more complex patterns for a 2D bar code.
  • the data acquisition and processing module can be operable to perform a comparison to establish whether the predetermined characteristic signature matches the characteristic signature obtained by reading an article that has been placed in the reading volume.
  • an article such as a piece of paper
  • a digitally signed version of its own characteristic signature such as a barcode.
  • the predetermined characteristic signature should be obtained from the article's characteristic signature with a one-way function, i.e. using an asymmetric encryption algorithm that requires a private key. This acts as a barrier to an unauthorised third party with a reader, who wants to read fake articles and print on them a label that represents the reader's scan according to the encryption scheme.
  • the bar code label or other mark would represent a cryptogram decipherable by a public key, and the private key would be reserved for the authorised labellor party.
  • a database of signatures such as the predetermined characteristic signature or a class signature
  • the data acquisition and processing module may be operable to access the database and perform a comparison to establish whether the database contains a match to the characteristic signature or class signature of an article that has been placed in the reading volume.
  • the database may be part of a mass storage device that forms part of the reader apparatus, or may be at a remote location and accessed by the reader through a telecommunications link.
  • the telecommunications link may take any conventional form, including wireless and fixed links, and may be available over the Internet.
  • the data acquisition and processing module may be operable, at least in some operational modes, to allow a characteristic signature or class signature to be added to the database if no match is found. This facility will usually only be allowed to authorised persons for obvious reasons.
  • a database in addition to storing a signatures, it may also be useful to associate the signatures in the database with other information about the article such as a scanned copy of the document a photograph of a passport holder, details on the place and time of manufacture of the product, or details on the intended sales destination of vendable goods (e.g. to track grey importation).
  • Reader apparatuses as described above may be used in order to populate a database with characteristic signatures by reading a succession of articles, e.g. in a production line, and/or in order subsequently to verify authenticity of an article, e.g. in field use.
  • the invention allows identification of articles made of a variety of different kinds of generally compacted fibrous sheet materials, such as paper and cardboard.
  • Various embodiments of the invention allow it to be ascertained whether an article has been tampered with. This is possible if adhesively bonded transparent films, such as adhesive tape, cover the scanned area used to create the characteristic signature. If the tape must be removed to tamper with the article, e.g. to open a packaging box, the adhesive bonding can be selected so that it will inevitably modify the underlying surface. Consequently, even if similar tape is used to reseal the box, this will be detectable.
  • adhesively bonded transparent films such as adhesive tape
  • paper or cardboard we mean any article made using a wood pulp process.
  • the paper or cardboard may be treated with coatings or impregnations or covered with transparent material, such as cellophane. If long-term stability of the surface is a particular concern, the paper may be treated with an acrylic spray-on transparent coating, for example.
  • the invention is considered to be particularly useful for paper or cardboard articles from die following list of examples:
  • the invention also allows identification of articles of a variety of different types, including packaging, documents, and clothing.
  • the article may be contained in packaging, and optionally the packaging may be sealed in a tamper-proof manner.
  • the packaging may be an appendage to the article, such as a tag secured with a connector that cannot be released without being visibly damaged. This may be especially useful for pharmaceutical products, cosmetic goods and perfume, and spare parts for aircraft or land or water vehicles, for example.
  • the characteristic signature or class signature can in some cases be obtained from something ancillary to a vendable product, such as its packaging, and in other cases obtained from the object itself, such as from surface structure of a document, or a vendable product.
  • the invention may find many practical applications, for example to control grey market importation or counterfeiting. For such applications, portable readers could be used by customs officers or trading standards officers.
  • the characteristic signature or class signature can be encoded as a digital signature for most applications. Typical sizes of a digitally encoded characteristic signature with current technology would be in the range 200 bits to 8 k bits, where currently it is preferable to have a digital signature size of about 2 k bits for high security.
  • the class signature may be encoded using fewer bits than the characteristic signature since it provides a less secure mechanism for identifying articles.
  • the digitally encoded signatures may themselves be encoded using an encryption algorithm.
  • FIG. 1 is a schematic side view of a reader apparatus embodying the invention
  • FIG. 2 is a schematic perspective view showing how the reading volume of the reader apparatus is sampled n times by scanning an elongate beam across it;
  • FIG. 3 is a block schematic diagram of the functional components of the reader apparatus
  • FIG. 4 is a perspective view of an embodiment of a reader apparatus showing its external form
  • FIG. 5 is a schematic perspective view of an alternative embodiment of the reader apparatus
  • FIG. 6A shows schematically in side views an alternative imaging arrangement for a reader embodying the invention based on directional light collection and blanket illumination;
  • FIG. 6B shows schematically in plan view the optical footprint of a further alternative imaging amusement for a reader embodying the invention in which directional detectors are used in combination with localised illumination with an elongate beam;
  • FIG. 7A shows data a set of data points taken from a single photodetector after linerisation with the encoder signal
  • FIG. 7B shows a FT of the set of data points shown in FIG. 7A ;
  • FIG. 8A shows how the amplitude of an FT peak varies as paper is rotated with respect to a scan direction
  • FIG. 8B shows how the wavelength of a strongest FT peak varies with angle as paper is rotated with respect to a scan direction
  • FIG. 9 shows a flow diagram showing how a class side is measured from an article and authenticated or recorded
  • FIG. 10A shows raw data from a single photodetector using the reader of FIG. 1 which consists of a photodetector signal and an encoder signal;
  • FIG. 10B shows the photodetector data of FIG. 10A after linearisation with the encoder signal and averaging the amplitude
  • FIG. 10C shows the data of FIG. 10B after digitisation according to the average level
  • FIG. 11 is a flow diagram showing how a characteristic signature of an article is generated from a scan
  • FIG. 12 is a flow diagram showing how a signature of an article obtained from a scan can be verified against a signature database
  • FIG. 13A shows a rotary scanner for use in a rotary scanning apparatus for determining a class signature from an article made of paper or cardboard;
  • FIG. 13B shows a lid for fitting to the housing of the rotary scanner shown in FIG. 13A ;
  • FIGS. 14A and 14B together illustrate a flow diagram showing how a class signature is measured from an article using a rotary scan and authenticated or recorded;
  • FIG. 15 is a flow diagram showing how an apparatus according to an embodiment of the invention operates.
  • FIGS. 16A to 16G schematically show various bespoke screens embodying the invention.
  • FIG. 1 is a schematic side view of a reader apparatus 1 embodying the invention.
  • the optical reader apparatus 1 is for measuring a class signature and a characteristic signature from an article (not shown) arranged in a reading volume of the apparatus.
  • the reading volume is formed by a reading aperture 10 which is a slit in a housing 12 .
  • the housing 12 contains the main optical components of the apparatus.
  • the slit has its major extent in the x direction (see inset axes in the drawing).
  • the laser beam 15 is focused by a cylindrical lens 18 into an elongate focus extending in the y direction (perpendicular to the plane of the drawing) and lying in the plane of the reading aperture.
  • the elongate focus has a major axis dimension of about 2 mm and a minor axis dimension of about 40 micrometres.
  • These optical components are contained in a subassembly 20 .
  • the four detector elements 16 a . . . d are distributed either side of the beam axis offset at different angles in an interdigitated arrangement from the beam axis to collect light scattered in reflection from an article present in the reading volume.
  • the offset angles are ⁇ 70, ⁇ 20, +30 and +50 degrees.
  • the angles either side of the beam axis are chosen so as not to be equal so that the data points they collect are as independent as possible. All four detector elements are arranged in a common plane.
  • the photodetector elements 16 a . . . d detect light scattered from an article placed on the housing when the coherent beam scatters from the reading volume.
  • the source is mounted to direct the laser beam 15 with its beam axis in the z direction, so that it will strike an article in the reading aperture at normal incidence.
  • the depth of focus is large, so that any differences in the article positioning in the z direction do not result in significant changes in the size of the beam in the plane of the reading aperture.
  • the depth of focus is approximately 0.5 mm which is sufficiently large to produce good results.
  • a drive motor 22 is arranged in the housing 12 for providing linear scanning motion of the optics subassembly 20 via suitable bearings 24 or other means, as indicated by the arrows 26 .
  • the drive motor 22 thus serves to move the coherent beam linearly in the x direction over the reading aperture 10 so that the beam 15 is scanned in a direction transverse to the major axis of the elongate focus. Since the coherent beam 15 is dimensioned at its focus to have a cress-section in the xz plane (plane of the drawing) that is much smaller that a projection of the reading volume in a plane normal to the coherent beam, i.e. in the plane of the housing wall in which the reading aperture is set, a scan of the drive motor 22 will cause the coherent beam 15 to sample many different parts of the reading volume under action of the drive motor 22 .
  • FIG. 2 is included to illustrate sampling provided by scanning and is a schematic perspective view showing how the reading area is sampled n times by scanning an elongate beam across it.
  • the sampling positions of the focused laser beam as it is scanned along the reading aperture under action of the drive is represented by the adjacent rectangles numbered 1 to n which sample an area of length ‘l’ and width ‘w’.
  • Data collection is made so as to collect signal at each of the n positions as the drive is scanned along the slit Consequently, a sequence of k ⁇ n data points are collected that relate to scatter from the n different illustrated parts of the reading volume.
  • Each detector k thus has an associated sequence of a data points obtained at different times as the coherent beam scans the reading volume.
  • distance marks 28 formed on the underside of the housing 12 adjacent the slit 10 along the x direction, i.e. the scan direction.
  • An example spacing between the marks in the x direction is 300 micrometres. These marks are sampled by a tail of the elongate focus and provide for linearisation of the data in the x direction, as is described in more detail further below.
  • the measurement is performed by an additional phototransistor 19 which is a directional detector arranged to collect light from the area of the marks 28 adjacent the slit.
  • the marks 28 are read by a dedicated encoder emitter/detector module 19 that is part of the optics subassembly 20 .
  • Encoder emitter/detector modules are used in bar code readers. For example, we have used an Agilent HEDS-1500 module that is based on a focused light emitting diode (LED) and photodetector. The module signal is fed into the PIC ADC as an extra detector channel.
  • imprinted features provided on paper during the manufacturing process have a periodicity of between about 200 ⁇ m to 600 ⁇ m. Sampling of the data points should thus be made at least every 100 ⁇ m or less in order to detect the smallest likely imprinted features that may be present.
  • the apparatus can perform a swift but relatively coarse initial scan to obtain one data point every 90 ⁇ m or so in order to populate the sets of data points for the k detectors. One or more of the sets of data points can then be analysed using the techniques described below to determine the class signature. If a match to the class signature is found the apparatus may then seek to measure the unique characteristic signature of the individual article.
  • a finer resolution scan may be made.
  • This scan can be used to measure the characteristic signature, or both the class signature and the characteristic signature.
  • a typical range of values for k ⁇ n depending on desired security level, article type, number of detector channels ‘k’ and other factors is expected to be 100 ⁇ k ⁇ n ⁇ 10,000. It has also been found that increasing the number of detectors k also improves the insensitivity of the measurements to surface degradation of the article through handling, printing etc.
  • a rule of thumb is that the total number of independent data points, i.e. k ⁇ n, should be 500 or more to give an acceptably high security level with a wide variety of surfaces.
  • FIG. 3 is a block schematic diagram of the functional components of the reader apparatus.
  • the motor 22 is connected to a programmable interrupt controller (PIC) 30 through an electrical link 23 .
  • the detectors 16 a . . . d of the detector module 16 are connected through respective electrical connection lines 17 a . . . d to an analogue-to-digital converter (ADC) that is part of the PIC 30 .
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • ADC analogue-to-digital converter
  • a PC personal digital assistant
  • the PIC 30 and PC 34 collectively form a data acquisition and processing module 36 for determining a signature of the article from the set of data points collected by the detectors 16 a . . . d.
  • the PC 34 has access through an interface connection 38 to a database (dB) 40 .
  • the database 40 may be resident on the PC 34 in memory, or stored on a drive thereof.
  • the database 40 may be remote from the PC 34 and accessed by wireless communication, for example using mobile telephony services or a wireless local area network (LAN) in combination with the internet.
  • the database 40 may be stored locally on the PC 34 , but periodically downloaded from a remote source.
  • the database 40 contains a library of previously recorded class and characteristic signatures. In a variant upon this embodiment, the database 40 only contains a library of predetermined class signatures.
  • the PC 34 is programmed so that in use it accesses the database 40 and performs a comparison to establish whether the database 40 contains a match to the signature of the article that has been placed in the reading volume.
  • the PC 34 may also be programmed to allow a signature to be added to the database if no match is found. This mode of use is reserved for use by authorised users and may be omitted from systems that are to be used in the field exclusively for verification purposes.
  • FIG. 4 is a perspective view of the reader apparatus 1 showing its external form.
  • the housing 12 and slit-shaped reading aperture 10 are evident.
  • a physical location aid 42 is also apparent and is provided for positioning an article of a given form in a fixed position in relation to the reading aperture 10 .
  • the physical location aid 42 is in the form of a right-angle bracket in which the corner of a document or packaging box can be located. This ensues that the same part of the article can be positioned in the reading aperture 10 whenever the article needs to be scanned.
  • a simple angle bracket or equivalent is sufficient for articles with a well-defined corner, such as sheets of paper, passports, ID cards and packaging boxes.
  • a document feeder could be provided to ensure that the article placement was consistent.
  • the apparatus could follow any conventional format for document scanners, photocopiers or document management systems.
  • a suitable guide hole for example a rectangular cross-section hole for accepting the base of a rectangular box or a circular cross-section hole for accepting the base of a tubular box (i.e. cylindrical box).
  • a physical location aid 42 is provided where the reader apparatus 1 checks both class signatures and characteristic signatures.
  • this feature or its functional equivalent need not be present in variants of the reader apparatus 1 which only perform a check for class signatures.
  • FIG. 5 is a schematic perspective view of an alternative embodiment showing a reader apparatus 1 ′ intended for screening batches of articles.
  • the reader is based on a conveyor belt 44 on which articles of packaging can be placed, only one article 5 being illustrated for simplicity of representation.
  • a reading area 10 ′ on the article 5 is scanned by a static laser beam 15 as the article 5 passes on the conveyor belt 44 .
  • the laser beam 15 is generated by a laser source 14 arranged fixed in position beside the conveyor belt 44 .
  • the laser source 14 has an integral bean focusing lens (not shown) for producing a pencil-like near-collimated beam that ravels in the z direction (i.e.
  • the beam cross-section may be a spot i.e. circular (e.g. produced with integral spherical lens), or a line extending in the y direction (e.g. produced with integral cylindrical lens).
  • the functional components of the conveyor-based reader apparatus are similar to those of the stand-alone reader apparatus described further above.
  • the only difference of substance is that the article is moved rather than the laser beam, in order to generate the desired relative motion between scan beam and article.
  • the conveyor-based reader can be used in a production line or warehouse environment for populating a database with class/characterisation signatures by reading a succession of articles.
  • each article may be scanned again to verify that the recorded signature can be verified. This could be done with two systems operating in series, or one system through which each article passes twice. Batch scanning could also be applied at point of sale (POS), or using a reader apparatus that was based on POS equipment components.
  • POS point of sale
  • FIG. 6A shows schematically in side view such an imaging arrangement for a reader embodying the invention which is based on directional light collection and blanket illumination with a coherent beam.
  • An array detector 48 is arranged in combination with a cylindrical microlens array 46 so that adjacent strips of the detector array 48 only collect light from corresponding adjacent strips in the reading volume.
  • each cylindrical microlens is arranged to collect light signal from one of the n sampling strips. The coherent illumination can then take place with blanket illumination of the whole reading volume (not shown in the illustration).
  • a hybrid system with a combination of localised excitation and localised detection may also be useful in some cases.
  • FIG. 6B shows schematically in plan view the optical footprint of such a hybrid imaging arrangement for a reader embodying the invention in which directional detectors are used in combination with localised illumination with an elongate beam.
  • This embodiment may be considered to be a development of the embodiment of FIG. 1 in which directional detectors are provided.
  • three banks of directional detectors are provided, each bank being targeted to collect light from different portions along the ‘l ⁇ w’ excitation strip.
  • the collection area from the plane of the reading volume are shown with the dotted circles, so that a first bank of, for example 2, detectors collects light signal from the upper-portion of the excitation strip, a second bank of detectors collects light signal from a middle portion of the excitation strip and a third bank of detectors collects light from a lower portion of the excitation strip.
  • one or more of different banks of directional detectors can be used for a purpose other than collecting light signal that samples a speckle pattern.
  • one of the banks may be used to collect light signal in a way optimised for barcode scanning. If this is the case it will generally be sufficient for that bank to contain only one detector, since there will be no advantage obtaining cross-correlations when only scanning for contrast.
  • FIG. 7A shows data a set of data points taken from a single photodetector 16 a . . . d of the reader of FIG. 1 after linearisation with the encoder signal.
  • the point number of the x-axis corresponds to data points sampled from a standard A4 sheet of paper placed in the reading volume and scanned by the coherent beam.
  • FIG. 7B shows a FT of linearised set of data points shown in FIG. 7A .
  • FIG. 7A While the data points in FIG. 7A appear to be largely random, one notices in FIG. 7B a strong peak at a wavelength of 422 ⁇ m
  • FIG. 7B a strong peak at a wavelength of 422 ⁇ m
  • a similar scan and FT using a sheet of paper from a different manufacturer yielded a peak wavelength of 287 ⁇ m, indicating how the peak wavelength can be used to provide a class signature that can discriminate between papers made on different meshes.
  • the wavelength of the FT peak is found to depend upon the direction in which the paper is oriented with respect to the coherent beam scan direction. For example, the first paper sheet yielded a peak wavelength of 422 ⁇ m when scanned in the ‘portrait’ orientation, and a peak wavelength of 274 ⁇ m when scanned in the ‘landscape’ orientation. Additionally, one side of the paper often gives a stronger FT peak than the other side. We believe this to be due to the stronger surface corrugations arising on the side of the paper which was in contact with the mesh during the paper's manufacture.
  • FIG. 8A shows how the amplitude of an Fr peak varies as the paper is rotated through 90° with respect to the scan direction.
  • the indentations of the paper are believed to form a rectangular grid of dimensions 408 ⁇ m ⁇ 274 ⁇ m.
  • the beam scanning direction is normal to the 408 ⁇ m periodically spaced grid indentations.
  • Strong signals appear at about 0°, 45° and 90°.
  • the 90° signal arises when the scanning direction is normal to the 274 ⁇ m periodically spaced grid indentations.
  • FIG. 8B shows how the wavelength of the strongest FT peak varies with angle from as the paper is rotated with respect to the scan direction.
  • the wavelength of the strongest FT peak is pretty much constant at around 408 ⁇ m as the angle is rotated from 0° to about 10°.
  • the peak in the FT corresponding to the class signature is best detected when the scanning laser direction is within approximately ⁇ 10° of the long axes of the surface ripples coming from the fabrication mesh. This is because the projection of the elongated laser spot (approximately 2 mm long) becomes comparable to the spacing between ripples once the rotation angle exceeds about 10°.
  • FIG. 9 is a flow diagram showing how a class signature is measured from an article and authenticated or recorded.
  • Step A 1 is the initial step during which the scan motor is started.
  • the scan motor is programmed to move at speed V.
  • Step A 2 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan.
  • the time interval between sample points is ⁇ t.
  • the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then an encoder signal need not be acquired.
  • the data is acquired by the PIC 30 taking data from the ADC 31 .
  • the data points are transferred in real time from the PIC 30 to the PC 34 .
  • the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan.
  • the number n of data points per detector channel collected in each scan is defined as N in the following. Further, the value a k (i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N. Examples of two raw data sets obtained from such a scan are illustrated in FIG. 10A .
  • Step A 3 is a return scan head step.
  • the scan motor is reversed to reset the scanning mechanism to its initial position in preparation for a subsequent scanning operation.
  • Step A 4 is an optional linearisation step. If performed, this step applies numerical interpolation to locally expand and contract a k (i) so that the encoder transitions are evenly spaced in time. This corrects the set of data points for local variations in the motor speed. This step is performed in the PC 34 under computer program control.
  • Step A 5 is a FT step in which an Fr amplitude spectrum A k (i) of the Fourier Transform of a k (i) is calculated This step is performed in the PC 34 under computer program control by application of a fast Fourier transform (FI) to individual of the k sets of data points.
  • FI fast Fourier transform
  • an averaged FT amplitude spectrum can be calculated from respective of the k individual amplitude spectra.
  • Step A 6 is an identification step in which the value of i which maximises A k (i), excluding Hi (the DC component), is identified. This index, i peak , is identified in the PC 34 under computer program control.
  • Step A 8 is a decision point If an article is having its class signature recorded the next step will be Step A 9 . Whereas if an article is being authenticated by a measurement of its class signature the next step will be Step A 10 .
  • the PC 34 is programmed to determine which step follows step A 8 .
  • Step A 9 is a step of storing a class signature.
  • a record comprising the class signature value ⁇ peak associated to a description of the paper is stored by the PC 34 in the database 40 .
  • the database 40 may be remotely located from the optical reader apparatus 1 , and the record may be securely encrypted prior to transmission therebetween.
  • Step A 10 is a step of verifying a class signature.
  • the PC 34 compares ⁇ peak with all entries in the database 40 , until a match is found to within a predefined error margin.
  • the PC 34 displays the record entry description for the matching paper type, if any is found. If no matching entry is found, the PC 34 may optionally seek to extend a search to other databases. Optionally, a message stating that no match is available may be displayed Optionally, whether or not any class match is found, the PC 34 may subsequently seek to perform an analysis to determine whether a characteristic signature from the article matches a predetermined characteristic signature in order to attempt to uniquely identify the article.
  • FIG. 10A shows raw data from a single one of the photodetectors 16 a . . . d of the reader of FIG. 1 .
  • the graph plots signal intensity I in arbitrary units (a.u.) against point number n (see FIG. 2 ).
  • FIG. 10B shows the photodetector data of FIG. 10A after linearisation with the encoder signal.
  • the average of the intensity has been computed and subtracted from the intensity values.
  • the processed data values thus fluctuate above and below zero.
  • FIG. 10C shows the data of FIG. 10B after digitisation to provide a characteristic signature.
  • the digitisation scheme adopted is a simple binary one in which any positive intensity values are set at value 1 and any negative intensity values are set at zero. It will be appreciated that multi-state digitisation could be used instead, or any one of many other possible digitisation approaches. The main important feature of the digitisation is merely that the same digitisation scheme is applied consistently.
  • FIG. 11 is a flow diagram showing how a characteristic signature of an article is generated from a scan.
  • Step S 1 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan. Simultaneously, the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then linearisation of the data may not be required.
  • the data is acquired by the PIC 30 taking data from the ADC 31 .
  • the data points are transferred in real time from the PIC 30 to the PC 34 . Alternatively, the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan.
  • the number n of data points per detector channel collected in each scan is defined as N in the following.
  • the value a k (i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N. Examples of two raw-data sets obtained from such a scan are illustrated in FIG. 10
  • Step S 2 uses numerical interpolation to locally expand and contract a k (i) so that the encoder transitions are evenly spaced in time. This corrects for local variations in the motor speed. This step is performed in the PC 34 by a computer program.
  • Step S 3 is an optional step. If performed, this step numerically differentiates the data with respect to time. It may also be desirable to apply a weak smoothing function to the data. Differentiation may be useful for highly structured surfaces, as it serves to attenuate uncorrelated contributions from the signal relative to correlated (speckle) contributions.
  • Step S 4 is a step in which, for each photodetector, the mean of the recorded signal is taken over the N data points.
  • This mean value corresponds to the artefact signal referred to previously.
  • this mean value is subtracted from all of the data points so that the data are distributed about zero intensity.
  • FIG. 10B shows an example of a scan data set after linearisation and subtraction of a computed average.
  • Step S 5 digitises the analogue photodetector data to compute a digital signature representative of the scan.
  • the digitised data set is defined as d k (i) where i runs from 1 to N.
  • the signature of the article may advantageously incorporate further components in addition to the digitised signature of the intensity data just described. These further optional signature components are now described.
  • Step S 6 is an optional step in which a smaller ‘thumbnail’ digital signature is created. This is done either by averaging together adjacent groups of m readings, or more preferably by picking every cth data point, where c is the compression factor of the thumbnail. The latter is preferred since averaging may disproportionately amplify noise.
  • the same digitisation rule used in Step 5 S is then applied to the reduced data set.
  • the thumbnail digitisation is defined as t k (i) where i runs 1 to N/c and c is the compression factor.
  • Step S 7 is an optional step applicable when multiple detector channels exist.
  • the additional component is a cross-correlation component calculated between the intensity data obtained from different ones of the photodetectors. With 2 channels there is one possible cross-correlation coefficient, with 3 channels up to 3, and with 4 channels up to 6 etc.
  • the cross-correlation coefficients are useful, since it has been found that they are good indicators of material type. They may thus be used to corroborate information derived from analysing the class signature. For example, for a particular type of document, such as a passport of a given type, or laser printer paper, the cross-correlation coefficients always appear to lie in predictable ranges.
  • a normalised cross-correlation can be calculated between a k (i) and a l (i), where k ⁇ l and k,l vary across all of the photodetector channel numbers.
  • the normalised cross-correlation function r is defined as
  • Step S 8 is another optional step which is to compute a simple intensity average value indicative of the signal intensity distribution.
  • This may be an overall average of each of the mean values for the different detectors or an average for each detector, such as a root mean square (rms) value of a k (i). If the detectors are arranged in pairs either side of normal incidence as in the reader described above, an average for each pair of detectors may be used.
  • the intensity value has been found to be a good crude filter for material type, since it is a simple indication of overall reflectivity and roughness of the sample. For example, one can use as the intensity value the unnormalised rms value after removal of the average value, i.e. the DC background.
  • the signature data obtained from scanning an article can be compared against records held in a signature database for verification purposes and/or written to the database to add a new record of the signature to extend the existing database.
  • a new database record will include the digital signature obtained in Step S 5 as well as optionally its smaller thumbnail version obtained in Step S 6 for each photodetector channel, the cross-correlation coefficients obtained in Step S 7 and the average value(s) obtained in Step S 8 .
  • the thumbnails may be stored on a separate database of their own optimised for rapid searching, and the rest of the data (including the thumbnails) on a main database.
  • FIG. 12 is a flow diagram showing how a characteristic signature of an article obtained from a scan can be verified against a predetermined characteristic signature database.
  • the database could simply be searched to find a match based on the fall set of characteristic signature data.
  • the process preferably uses the smaller thumbnails and pre-screening based on the computed average values and cross-correlation coefficients as now described.
  • Verification Step V 1 is the first step of the verification process, which is to scan an article according to the process described above, i.e. to perform Scan Steps S 1 to S 8 .
  • Verification Step V 2 takes each of the thumbnail entries and evaluates the number of matching bits between it and t k (i+j), where j is a bit offset which is varied to compensate for errors in placement of the scared area. The value of j is determined and then the thumbnail entry which gives the maximum number of matching bits. This is the ‘hit’ used for further processing.
  • Verification Step V 3 is an optional pre-screening test that is performed before analysing the full digital signature stored for the record against the scanned digital signature.
  • the rms values obtained in Scan Step S 8 are compared against the corresponding stored values in the database record of the hit.
  • the ‘hit’ is rejected from further processing if the respective average values do not agree within a predefined range.
  • the article is then rejected as non-verified (i.e. jump to Verification Step V 6 and issue fail result).
  • Verification Step V 4 is a further optional pre-screening test that is performed before analysing the full digital signature.
  • the cross-correlation coefficients obtained in Scan Step S 7 are compared against the corresponding stored values in the database record of the hit.
  • the ‘hit’ is rejected from further processing if the respective cross-correlation coefficients do not agree within a predefined range.
  • the article is then rejected as non-verified (i.e. jump to Verification Step V 6 and issue fail result).
  • pre-screening may be based upon the results of an article's class signature.
  • Verification Step V 5 is the main comparison between the scanned digital signature obtained in Scan Step S 5 and the corresponding stored values in the database record of the hit.
  • the full stored digitised signature, d k db (i) is split into n blocks of q adjacent bits on k detector channels, i.e. there are qk bits per block A typical value for q is 4 and a typical value for k is 4, making typically 16 bits per block.
  • the qk bits are then matched against the qk corresponding bits in the stored digital signature d k db (i+j). If the number of matching bits within the block is greater or equal to some pre-defined threshold Z then the number of matching blocks is incremented.
  • a typical value for z thresh is 13.
  • s is the probability of an accidental match between any two blocks (which in turn depends upon the chosen value of z threshold )
  • M is the number of matching blocks
  • p(M) is the probability of M or more blocks matching accidentally.
  • Verification Step V 6 issues a result of the verification process.
  • the probability result obtained in Verification Step V 5 may be used in a pass/fail test in which the benchmark is a pre-defined probability threshold.
  • the probability threshold may be set at a level by the system or may be a variable parameter set at a level chosen by the user.
  • the probability result may be output to the user as a confidence level, either in raw form as the probability itself, or in a modified form using relative terms (e.g. no match/poor match/good match/excellent match) or other classification.
  • cross-correlation coefficients instead of treating the cross-correlation coefficients as a pre-screen component, they could be treated together with the digitised intensity data as part of the ma signature.
  • the cross-correlation coefficients/class signatures could be digitised and added to the digitised intensity data.
  • the cross-correlation coefficients/class signatures could also be digitised on their own and used to generate bit strings or the like which could then be searched in the same way as described above for the thumbnails of the digitised intensity data in order to find the hits.
  • FIG. 13A shows a rotary scanner 100 for use in a rotary scanning apparatus for determining a class signature from an article made of paper or cardboard.
  • the scanner 100 comprises a scan head 102 rotatably mounted in a housing 110 .
  • the scan head 102 is mounted on a rotating arm 104 adjacent a position encoder module 106 .
  • the rotating arm is operably coupled to a drive motor 108 .
  • FIG. 13B shows a lid 120 for fitting to the housing 110 of rotary scanner 100 shown in FIG. 13A .
  • the lid 120 comprises a flat face portion 122 having an arcuate slot 124 defined therein.
  • the arcuate slot 124 subtends an angle of 360° minus the angle 126 .
  • the acuate slot 124 subtends an angle of 270°. This allows the scan head 102 to scan over approximately 270 degrees of an arc, thus sampling all possible orientations of the paper.
  • FIGS. 13A and 13B can be incorporated into scanning system similar to the linear scanning apparatus previously described.
  • the linear scanning apparatus sensing system is replaced by the rotary version of FIGS. 13A and 13B , whilst the data processing apparatus is reprogrammed to implement the method described below in relation to FIG. 14 .
  • Step R 1 is the initial step during which the scan motor is started.
  • the scan motor is programmed to move at speed v.
  • Step R 2 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan.
  • the time interval between sample points is ⁇ t.
  • the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then an encoder signal need not be acquired.
  • An encoder signal may be provided by detecting when the position encoder module 106 passes markings provided on the lid 120 adjacent the slot 124 .
  • the data is acquired by the PIC 30 taking data from the ADC 31 .
  • the data points are transferred in real time from the PIC 30 to the PC 34 .
  • the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan.
  • the number n of data points per detector channel collected in each scan is defined as N in the following.
  • the value a k (i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N.
  • Step R 3 is a return scan head step.
  • the scan motor is reversed to reset the scanning mechanism to its initial position in preparation for a subsequent scanning operation.
  • Step R 4 is an optional linearisation step. If performed, this step applies numerical interpolation to locally expand and contract a k (i) so that the encoder transitions are evenly spaced in time. This corrects the set of data points for local variations in the motor speed. This step is performed in the PC 34 under computer program control.
  • Step R 5 is an initialisation step at which i 0 is set to zero.
  • Step R 7 is a FT step in which an FT amplitude spectrum B k (i) of the Fourier Transform of b k (i) is calculated.
  • This step is performed in the PC 34 under computer program control by application of a fast Fourier transform (FT) to individual of the k sets of data points.
  • FT fast Fourier transform
  • an averaged FT amplitude spectrum can be calculated from respective of the k individual amplitude spectra should multiple detectors be provided in the scanner head 102 . Because of the shorter sequences of data used in each transform, the Fr peaks are broader and less intense than for the linear scan. Nevertheless, under certain conditions, the set of spectra form a good class signature for the paper.
  • Step P 9 is a step at which the root mean square (r.m.s.) value of B k (i) is determined. Calculate the r.m.s value of B k (i), using:
  • FIG. 8A shows for a real measurement from a sheet of paper the ratio of the amplitude of the strongest peak in the amplitude spectrum to the r.m.s. value of the amplitude spectrum
  • a clearly significant peak can be seen in the angular range 0-15 degrees, with weaker peaks appearing around 45 degrees and 90 degrees. Focusing on the strongest peak close to zero degrees, FIG. 8B shows the wavelength of this peak as a function of angle.
  • a roughly constant wavelength of 408 ⁇ m is found, which forms the class signature for this sheet of paper.
  • the slightly upward curvature in the dependence of wavelength on angle which can be seen in FIG. 8B is due to the 1/cos(angle) projection of the wavelength as the scan direction varies.
  • Step R 10 is a ratio determining step.
  • the ratio B(i peak /rms) is calculated and stored.
  • Step R 11 is an incrementing step at which i 0 is incremented
  • Step R 13 is a global peak data point determining step at which i peak the value of i 0 which maximises the ratio B(i peak /rms) is determined.
  • Step R 15 is a decision point. If an article is having its class, signature recorded the next step will be Step R 16 . Whereas if an article is being authenticated by a measurement of its class signature the next step will be Step R 17 .
  • the PC 34 is programmed to determine which step follows step R 15 .
  • Step R 16 is a step of storing a class signature.
  • a record comprising the class signature value ⁇ peak associated to a description of the paper is stored by the PC 34 in the database 40 .
  • the database 40 may be remotely located from the optical reader apparatus 1 , and the record may be securely encrypted prior to transmission therebetween.
  • Step R 17 is a step of verifying a class signature.
  • the PC 34 compares ⁇ peak with all entries in the database 40 , until a match is found to within a predefined error margin.
  • the PC 34 displays the record entry description for the matching paper type, if any is found. If no matching entry is found, the PC 34 may optionally seek to extend a search to other databases. Optionally, a message stating that no match is available may be displayed. Optionally, whether or not any class match is found, the PC 34 may subsequently seek to perform an analysis to determine whether a characteristic signature from the article matches a predetermined characteristic signature in order to attempt to uniquely identify the article.
  • FIG. 15 is a flow diagram showing how an apparatus according to an embodiment of the invention operates.
  • Step A 1 is the start of the process.
  • the process is under the control of the PC 34 .
  • Step A 2 is a step of positioning an article to be analysed in a reading volume. This step can be performed manually or automatically.
  • a sheet feeder may be used to position paper/cardboard articles in the apparatus reading volume or a hand-held scanner can be placed on the article.
  • Step A 3 is a step of scanning the article. In one embodiment this involves moving the beam with respect to the article using a linear scan. However, a rotary scan of the type hereindescribed may be used to perform this step.
  • Step A 4 is a step of measuring the scan position relative to the reading volume. Information relating to the position of the scanner over the time period of the scan is recorded. This step is performed by the PC 34 monitoring the scanner position by reading data from the encoder/decoder 19 via the PIC 30 whilst the scan is in progress.
  • Step A 5 is a data collection step during which the set of data points are sequentially populated.
  • Each set of data points from the detectors 16 a - d are averaged by the PC 34 and stored as an averaged set of data points.
  • Step A 6 is a linearisation step.
  • the PC linearises the set of data points prior to determining a class signature by using the relative measured position information obtained at step A 4 to modify the set of data points in order to ensure that consecutive data points in the set are equally-spaced with respect to time or position of their acquisition during the scan.
  • Step A 7 is a transform step.
  • the PC 34 applies a fast Fourier transform (FFT) to the averaged set of data points.
  • FFT fast Fourier transform
  • An FFT, or other transform may be used to provide a transformed data set comprising one or more peaks.
  • Step A 8 involves determining the class signature.
  • the amplitude peaks of the transform found in step A 7 are thresholded to derive a digital signal. This digital signal is used as the class signature.
  • Step A 9 is a comparison step.
  • the class signature is compared to a database of predetermined class signatures stored in the database 40 .
  • Step A 10 is a decision step. If no match for the class signature is found in the database 40 , the apparatus proceeds to step A 11 . Otherwise, where a match is found for the class signature, the apparatus proceeds to implement step A 12 in order to verify the characteristic signature.
  • Step A 11 is a rejection step at which the apparatus can alert the operator of the apparatus that the class signature of the article has not been recognised. The operator may subsequently decide how to act upon this notification.
  • Step A 12 is a step of determining a characteristic signature. This step may comprise steps of determining a characteristic signature such as are described above. However, prior to searching the database 40 for all characteristic signatures in the database to compare to the measured characteristic signature, the PC 34 can select a subset of the predetermined characteristic signatures to search. This speeds up the search for a match to the measured characteristic signature. Additionally, in this embodiment, the apparatus can use the same sets of data points obtained during the scan to derive both the class and characteristic signatures.
  • Step A 13 is another decision step. If no match for the characteristic signature is found in the database 40 , the apparatus proceeds to step A 11 as described above.
  • Step A 14 is a step that is reached if both the class and characteristic signatures are recognised. At this step various indicia or actions may occur. For example, an indication that the paper/cardboard article has been validly identified may be displayed to an operator of the apparatus, an automatic lock release may be activated, etc. as desired.
  • an article made of material such as paper or cardboard
  • the scan area is essentially arbitrary in terms of its size or location on an article. If desired, the scan could be a linear scan rastered to cover a larger two-dimensional area, for example.
  • this can be applied to identify a product by its packaging, a document or a ticketed item of clothing, by exposing the article to coherent radiation, collecting a set of data points that measure scatter of the coherent radiation from intrinsic structure of the article, and determining a class/characteristic signature of the product from the set of data points.
  • a further security measure that can be applied to paper or cardboard, for example, is to adhesively bond a transparent seal (e.g. adhesive tape) over the scanned area.
  • the adhesive is selected to be sufficiently strong that its removal will destroy the underlying surface structure which it is essential to preserve in order to perform a characteristic signature verification scan.
  • the reader may be embodied in an apparatus designed specifically to implement the invention.
  • the reader will be designed by adding appropriate ancillary components to an apparatus principally designed with another functionality in mind, such as a photocopier machine, document scanner, document management system, POS device, ATM, air ticket boarding card reader or other device.
  • FIG. 16A-G show bespoke screens according to various embodiments of the invention.
  • the screens can be used in a standard paper-making process.
  • Imprints may be provided to provide a desired class signature. Such imprints may incorporate one-dimensional or two-dimensional pattern variations.
  • the patterns imprinted may be periodic with a periodicity that is less 1 ha, or equal to, the length of a scan in order to ensure that a scanner detects the desired frequency components of the pattern.
  • the bespoke screens can be used to replace standard paper making screens.
  • screens may be made using wires, plates etc., formed of stainless steel, polymer materials etc.
  • FIG. 16A shows a bespoke screen 160 according to an embodiment of the invention.
  • the bespoke screen 160 comprises a grid of wires 161 a - n spaced at regular intervals 163 in a first direction (y-axis). Spaced groups of regularly spaced individual wires 162 a - n are provided at regular intervals 164 in a second direction (x-axis) transverse to the first direction.
  • the imprint left by this screen 160 thus has a single frequency component in the first direction. It also has two frequency components in the second direction.
  • the first component reflects the spacing of the groups of wires 164 and the second the inter-wire spacing 165 .
  • FIG. 16B shows a bespoke screen 170 according to an embodiment of the invention.
  • the bespoke screen 170 comprises a grid of wires 171 a - n spaced at regular intervals 173 in a first direction (y-axis). Spaced groups of wires 172 a - n are provided at regular intervals 174 in a second direction (x-axis) transverse to the first direction. The groups of wires 172 a - n provided in the second direction are spaced according to a chirped pattern in which the spacing between the individual wires in the group increases linearly.
  • the imprint left by this screen thus has a single frequency component in the first direction. It also has a spread frequency signal in the second direction which derives from the chirped spatial modulation applied to the wires in the groups 172 a - n , as well as a frequency component derived from the spacing 174 between the groups in the second direction.
  • FIG. 16C shows a bespoke screen 180 according to an embodiment of the invention.
  • the bespoke screen 180 comprises a grid of wires 181 a - n spaced at regular intervals in a first direction (y-axis).
  • Various groups of wires 182 a - n are provided at regular intervals 184 in a second direction (x-axis) transverse to the first direction. Where one such group may have been placed, in this embodiment a group 182 c incorporating a more closely packed group of wires is provided.
  • the imprint left by this screen has a single frequency component in the first direction. It also has a three component frequency signal in the second direction.
  • the first component reflects the spacing of the groups of wires 184 and the second the inter-wire spacing.
  • a third component is also present at a frequency higher than the first component. The third component derives from the closer packing of the wires in the group 182 c.
  • detecting the third frequency component use during paper manufacture of a group of wires having the spacing of the group 182 c can be detected. This can be used to encode a binary signal. Other group inter-wire spacings may also be provided to enable the encoding of a sequence of binary digits or byte. As is well-known, such bytes can be used to encode various information.
  • FIG. 16D shows a bespoke screen 190 according to an embodiment of the invention.
  • the bespoke screen 190 comprises a grid of wires 191 a - n spaced at regular intervals 193 in a first direction (y-axis). Spaced groups of wires 192 a - n are provided at regular intervals 194 in a second direction (x-axis) transverse to the first direction.
  • the wires 192 a - n in the groups are spaced according to a sinusoidally varying pattern.
  • the imprint left by this screen has a single frequency component in the first direction It also has a spread frequency signal in the second direction which derives from the sinusoidal spatial modulation applied to the wires in the groups 192 a - n .
  • the sinusoidal spatial modulation acts as a carrier frequency that can itself be modulated to provide various encoding schemes.
  • phase shift keying modulation may be applied to the carrier sinusoid and encoded into the pattern to be applied to paper by appropriate spacing of the wires.
  • FIG. 16E shows a bespoke screen 200 according to an embodiment of the invention.
  • the bespoke screen 200 comprises a grid of groups of wires 201 a - n spaced at regular intervals 203 in a first direction (y-axis). Wires in the groups 201 a - n are themselves spaced at regular intervals 206 . Spaced groups of regularly spaced wires 202 a - n are also provided at regular intervals 204 in a second direction (x-axis) transverse to the first direction.
  • the imprint left by this screen 200 has two frequency components in the first direction and two frequency components in the second direction.
  • the first component in the first direction reflects the spacing 203 of the groups of wires 201 a - n and the second the inter-wire spacing 206 .
  • the first component in the second direction reflects the spacing 204 of the groups of wires 202 a - n and the second the inter-wire spacing 205 .
  • FIG. 16F shows a bespoke screen 210 according to an embodiment of the invention.
  • the bespoke screen 210 comprises a plate 201 comprising a plurality of cross-shaped perforations 202 spaced in a regular two dimensional pattern.
  • Such a screen may be formed by etching or punching a sheet material.
  • FIG. 16G shows a bespoke screen 220 according to an embodiment of the invention.
  • the bespoke screen 220 comprises a plate 221 comprising a repeating pattern of perforations 222 , 224 spaced in a regular two dimensional pattern.
  • the pattern comprises a repeating sequence of alternating groups of circular perforations 222 , 224 of different sizes and numbers set out in a grid arrangement spaced at regular intervals 223 .
  • the first group of circular perforations 222 consists of a 3 ⁇ 3 array of circular holes grouped together.
  • the second group of circular perforations 224 consists of a 2 ⁇ 2 array of circular holes grouped together.
  • the first and second groups 222 , 224 occupy approximately the same surface area of the plate 221 .
  • the imprint left by the screen 220 has a frequency component deriving from the grid interval 223 plus a more complex response arising from the groups of perforations 222 , 224 . Such a response can be measured and used to provide a class signature for paper/cardboard articles made using the bespoke screen 220 .
  • imprints made by the illustrated screens are all amenable to functional analysis to determine a class signature, using Fourier transforms or other kinds of transform analysis.

Abstract

A method and apparatus for determining a class signature from an article made of paper or cardboard in order to identify a generic type of class to which the article belongs. An optical beam illuminates the article and a detector arrangement collects data points from light scattered from many different parts of the article as the article is scanned by the beam. The class signature derives from intrinsic properties imparted to the paper/cardboard during manufacture by, it is believed, the screen used during dewatering of paper pulp. Detection of the class signature allows the manufacturer or the particular paper making machine that made the paper to be identified.

Description

    BACKGROUND OF THE INVENTION
  • The invention relates to security methods, more especially verification of authenticity of an article such as a personal identification (ID) card, banknote, vendable product, document or other item made from fibrous sheet material such as paper or cardboard.
  • Many traditional authentication security systems rely on a process which is difficult for anybody other than the manufacturer to perform, where the difficulty may be imposed by expense of capital equipment, complexity of technical know-how or preferably both. Examples are the provision of a watermark in bank notes and a hologram on credit cards or passports. Unfortunately, criminals are becoming more sophisticated and can reproduce virtually anything that original manufacturers can do.
  • Because of this, there is a known approach to authentication security systems which relies on creating security tokens using some process governed by laws of nature which results in each token being unique, and more importantly having a unique characteristic that is measurable and can thus be used as a basis for subsequent verification. According to this approach tokens are manufactured and measured in a set way to obtain a unique characteristic. The characteristic can then be stored in a computer database, or otherwise retained. Tokens of this type can be embedded in the carrier article, e.g. a banknote, passport, ID card, important document. Subsequently, the carrier article can be measured again and the measured characteristic compared with the characteristics stored in the database to establish if there is a match.
  • Within this general approach it has been proposed to use different physical effects. One physical effect that has been considered in a number of prior art documents [1-4] is to use laser speckle from intrinsic properties of an article, typically in the form of a special token, to provide a unique characteristic. According to these techniques a large area, such as the whole of a special token, is illuminated with a collimated laser beam and a significant solid angle portion of the resultant speckle pattern is imaged with a CCD, thereby obtaining a speckle pattern image of the illuminated area made up of a large array of data points.
  • More recently a further laser speckle based technique has been developed [5] in which the unique characteristic is obtained by scanning a focused laser beam over the article and collecting many data points, typically 500 or more, from light scattered from many different parts of the article to collect a large number of independent data points.
  • By collecting a large number of independent signal contributions specific to many different parts of the article, a digital signature can be computed that is unique to the area of the article that has been scanned. This technique is capable of providing a unique signature from the surfaces of a wide variety of articles, including untreated paper, cardboard and plastic.
  • An important application of this technique is security verification from a database of stored signatures, referred to as the “master database” in the following. For example, in a perfumery factory, each perfume bottle box can be scanned by a reader to obtain a signature, and these signatures are entered into a master database. The master database includes a signature from every article, i.e. box of perfume, produced. Later, for field verification, a reader can be used to scan any box of perfume to obtain a signature, and this signature is compared with the master database to establish whether there is a matching signature held in the master database. If there is no match, the article is considered to be counterfeit. If there is a match, then the article is considered to be genuine.
  • In many applications, for example those relating to national security, civil documentation or high volume branded goods, the number of signatures stored in the master database may be very large. The number of entries may be perhaps millions, tens of millions or even hundreds of millions. For example, this would be the case if the scheme is used for passport or driving licence verification for a populous country.
  • For most if not all applications, it is necessary that the search of the master database can be carried out in a reasonable time. What is reasonable with vary from application to application, but for many applications a maximum reasonable time will only be a few seconds. This may become difficult to achieve if the number of articles becomes large.
  • It would therefore be desirable to be able to perform a different kind of verification of articles based on a property that is generic to all genuine articles, possibly without reference to a database. While this would not be as secure as a positive verification process based on a unique property of each article, it would be easier to perform and provide a negative test that picked out many clear forgeries or fakes. For example, it could be used as a pre-screening test before verifying based on a unique signature.
  • SUMMARY OF THE INVENTION
  • During initial development of the applicant's laser speckle based security technique, the applicant was surprised to discover that the calculated probability of a random match between the characteristic signals measured for two pieces of paper taken from the same ream was not as low as would be expected from theory. In one particular experiment, calculations indicated that there was approximately a 1 in 106 chance of the supposedly random characteristic signatures of two given pieces of paper matching to within a stated error threshold. However, during trials, matches of this quality were in practice being observed several times per day. This indicated that the characteristic signatures were not entirely random and contained a component of information which was constant from one sheet of paper to the next.
  • Subsequent investigations revealed that the paper gives rise to an artefact signal which is responsible for the increased chance of a random incorrect match between pieces of paper. Therefore, in order to reduce the possibility of false identification of articles, the applicant's apparatus was previously operated to remove the effect of the artefact signals.
  • The artefact signals themselves appear as one or more frequency components found in the output signal derived from a photodetector as the paper surface is scanned. The period and number of the frequency components found any particular artefact signal depends upon the orientation of the scanning beam with respect to the paper surface.
  • Following a review of the paper making process, the applicant currently believes that the artefact signals derive from the screens used to remove water from paper pulp during a drying process [6, 7, 8, 9, 10, 11, 12, 13]. Such screens are typically formed using a wire mesh having regular spacing. Whilst such screens are typically designed in an attempt not to leave any visible markings on the paper, it appears that the screens still impart a significant imprint to the paper during the ordinary paper manufacturing process. The applicants believe that the artefact signals they are able to detect are due to the imprints imparted by the screens.
  • Further experiments have revealed that the artefact signals are often common to sheets of paper taken from the same ream. Additionally, investigation has revealed that the artefact signals are stable over time and remain present even when a particular sheet of paper is damaged by crumpling, rubbing etc. However, interestingly it has been found that paper from different suppliers generally possess different artefact signals.
  • It thus appears that the artefact signals carry useful information, since they appear to be characteristic of any paper made using a particular screen, or screen product type. Moreover, given the large variety of screen types, materials and shapes this effect appears to be suitable to provide a class signature for identifying paper from a particular source, i.e. paper made using a particular screen or screen type.
  • By using the artefact signals to provide a class signature, the manufacturing source of the paper can be identified. Although this provides only a fairly low level of security on its own, it provides a useful technique for performing a negative test on authenticity, since a fail clearly indicates that the article cannot be genuine regardless of its unique individual signature.
  • Moreover, use of this technique ensures that not every sheet of paper that is manufactured has to be scanned to provide a predetermined characteristic signature. This technique can thereby avoid or reduce the need for storage of a large data set of such predetermined characteristic signatures. Additionally, to obtain the class signature, paper can be scanned anywhere on its surface. This helps reduce the need for accurate registration of an article being scanned with a scanning beam.
  • Hence, according to a first aspect of the invention, there is provided an apparatus for analysing an article made of paper or cardboard placed in a reading volume. The apparatus comprises a scanner for scanning an article with an optical beam, a detector arrangement for collecting a set of data points from signals obtained when the beam scans the reading volume, and a data acquisition and processing module for processing the set of data points so as to determine whether the article possesses a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article. Different ones of the data points relate to signals obtained at different times during the scan. In various embodiments, the source is mounted to direct the coherent beam towards the reading volume so that the coherent beam will strike an article with near normal incidence. In various embodiments the scanner is configured to project the beam towards the article at near normal incidence.
  • Periodic variations in the intrinsic properties of the article may give rise to an artefact signal that can be used to provide a class signature. In various embodiments the class signature is obtained by performing a mathematical transform of the set of data points to determined the class signature. A match between the measured class signature and a predetermined class signature is then indicative that the article is of the generic type associated with the class of the predetermined class signature. In various embodiments, one or more Fourier Transformations (FTs) of the set of data points are calculated in order to identify an artefact signal. The PT spectrum, or one or more peaks of it, can then be used as the class signature.
  • Selected subsets of the set of data points may also be analysed. For example, such subsets may be analysed in order to determine which subset gives rise to the largest amplitude peak in a transformed set of data points. Such subsets may include data points that correspond to scans performed on an article at various orientations. For example, a subset may comprise data points obtained over an arc forming part of a rotational scan.
  • Predetermined class signatures may be provided in a database that can be remotely located or included in a hand-held reader. Since the apparatus uses class signatures, the database can be relatively small. The predetermined class signatures can also be encrypted for enhanced security. By matching class signatures to predetermined class signatures, apparatus incorporating this feature can provide initial security screening of articles made of paper/card according to manufacturer/machine etc. For example, the apparatus can indicate to an operator that an article is not made of US passport paper, not made of UK banknote paper etc.
  • The apparatus may additionally comprise an encoder/decoder module for measuring the relative position of the beam and the article during the scan. The data acquisition and processing module may also be further operable to linearise the set of data points prior to determining a class signature by using relative measured position information obtained from the encoder/detector module. By modifying the set of data points in order to ensure that consecutive data points in the set are equally-spaced with respect to time or position of their acquisition during the scan, non-linear motion artefacts introduced by the scanning process can be largely removed.
  • The detector arrangement may include a plurality of detector channels arranged and configured to sense scatter from respective different parts of the reading volume. Each such detector channel can provide a set of time sequence (or, equivalently, linear scan position sequence) data that is used to determine a respective class signature.
  • Two or more such respective class signatures can be averaged to provide a measurement of the class signature having an improved signal to noise ratio. Since multiple detectors are used in various embodiments for determining unique characteristic responses, incorporation of averaging functionality does not significantly increase the cost or complexity of the apparatus.
  • In certain embodiments, different ones of the data points are obtained by linear scanning of the beam in the reading volume. Scanning entails relative movement between the beam and the reading volume. Use of a linear scan is beneficial as it is mechanically simple and relatively inexpensive to implement. A linear scan is also useful where the orientation of imprints that give rise to a class signature is predetermined (for example, where paper is always cut in a particular way with respect to the screen on which it is manufactured). Linear scans are generally relatively fast when determining a class signature, since the set of data points that is generated only requires minimal processing in order to extract that class signature.
  • For various other embodiments different ones of the data points are obtained by rotational scanning of the beam in the reading volume. For these embodiments, there is no need to accurately position articles when reading a class signature as subsequent processing of the data points can be used to determine the class signature. Advantageously, where rotational scanning is performed using a portable hand-held scanner, such a scanner may be placed anywhere on the article. Hand-held scanners of this type are thus of use to personnel, such as customs officers, who may need to perform a rapid in situ scan of a sample set articles from a large consignment of articles.
  • Various embodiments of the invention are operable to perform both a scan to verify a class signature and a scan to verify a unique characteristic signature. Verification of a characteristic signature may conditionally follow verification of the class signature or may be mandatory.
  • According to a second aspect of the invention, there is provided a method of analysing an article made of paper or cardboard. The method comprises placing an article in a reading volume, scanning the article with an optical beam, collecting a set of data points from signals obtained when the beam scans the reading volume, and processing the set of data points to determine whether the article possesses a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article. Different ones of the data points relate to signals obtained at different times during the scan.
  • The method according to this aspect of the invention may further comprise method steps for performing one or more functions/operations that may be implemented or provided by the apparatus according to the first aspect of the invention, herein described.
  • The apparatus according to the first aspect of the invention may be used to implement the method according to the second aspect of the invention. For example, the apparatus according to the first aspect of the invention may be used to verify authenticity of an article by performing a method of analysing the article. The apparatus may be used to check whether a particular article has an expected class signature. For example, it may be expected that a perfume box has a class signature derived from an artefact signal arising from an imprint of a rectangular grid with 250×400 micrometre spacing, or that a banknote has a class signature derived from an artefact signal arising from an imprint of an equal-sided hexagonal grid with 300 micrometre parallel side separation. It is also possible to use class signatures that derive from complex-shaped imprints. For example, class signatures may derive from imprints that are heart-shaped, star-shaped, etc.
  • Moreover, the apparatus may be used to recover information that is deliberately encoded into paper/cardboard by imprinting a predetermined pattern. Such a pattern need not be visible. For example, information may be recovered from the class signature which is encoded into the paper by way of a bespoke screen used during paper manufacture.
  • According to a third aspect of the invention, there is provided a screen for manufacturing a paper or cardboard article. The screen comprises a plurality of elements arranged and configured to impart a bespoke imprint pattern to a paper or cardboard article for providing a predetermined class signature that identifies the article as being of a known generic type. The screen is for the deliberate imparting of the imprint to the article so as to provide a predetermined class signature. The screen is a bespoke screen that provides imprints whose pattern is not currently found in screens used in the paper making industry. Such bespoke screens may further provide complex-shaped imprint patterns.
  • As indicated, this aspect relates to the deliberate imparting of an imprint to the article so as to provide a predetermined class signature. The screen may be any means that imparts a desired imprint to the paper or cardboard during or after it is manufactured. For example, the screen can be a perforated surface or may be composed of plates, wires etc.
  • A conventional screen comprises elements that are spatially arranged so as to impart a periodic imprint pattern to the paper or cardboard. By using a periodic pattern, a scan to determine the class signature can be performed anywhere on the paper. Such a periodic imprint pattern also provides the data points with a strong frequency component that is suitable for detection using FT or other analysis techniques.
  • There is however also the possibility of making specially patterned screens to take advantage of the imprinting effect to convey a spatial modulation of the surface structure of the paper following a variety of functional forms, symmetries etc.
  • The spatial modulation may be used to encode data such as, for example, binary data bits. Spatial modulation may, for example, by provided to encode data using chirped modulation, super-periodicity modulation, amplitude modulation, phase shift keying modulation, or frequency shift keying modulation.
  • The imprint pattern can incorporate complex shapes. For example, asymmetric shapes such as stars, hearts etc. or shapes having various varying degrees of symmetry may be incorporated to provide multiple frequency components into an artefact signal. Use of complex multiple frequency components for class signature recognition makes copying harder and also increases the number of possible class signatures that can be recognised.
  • One or more bit sequences may also be encoded into the paper or cardboard by using the imprint pattern for encoding. This provides numerous possibilities for incorporating information into the paper or cardboard. For example, information identifying a manufacturer, the machine the paper was made on, encrypted information relating to the expected class signature etc. can be encoded within the paper itself. Moreover, as previously indicated, this information can be robustly and invisibly stored.
  • According to a fourth aspect of the invention, there is provided a method of making a paper or cardboard article including a bespoke imprint pattern. The method according to this aspect of the invention comprises using a screen according to the third aspect of the invention to impart a bespoke imprint pattern.
  • According to a fifth aspect of the invention, there is provided a paper or cardboard article comprising a bespoke imprint pattern for providing a class signature for identifying the article as belonging to a known generic type. The imprint pattern may not be visible. For example, the imprint pattern may not be visible to the naked eye.
  • The bespoke imprint pattern of the paper/cardboard may be periodic. In various embodiments, the imprint pattern incorporates spatial modulation provided according to one or more of the following schemes: chirped modulation, super-periodicity modulation, amplitude modulation, phase shift keying modulation, and frequency shift keying modulation. It is also possible to use an imprint pattern that encodes one or more bit sequences into the paper or cardboard
  • The main embodiments are described in relation to the Figures. These embodiments can be used to detect a class signature and optionally also a unique characteristic signature. The detector channels may be made up of discrete detector components in the form of simple phototransistors when a characteristic signature is to be detected. Other simple discrete components could be used such as PIN diodes or photodiodes. Integrated detector components, such as a detector array could also be used, although this would add to the cost and complexity of the devices.
  • From initial experiments which modify the illumination angle of the beam on the article to be scanned, it also seems to be important in practice that beam is incident approximately normal to the surface being scanned in order to obtain a characteristic that can be repeatedly measured from the same surface with little change, even when the article is degraded between measurements.
  • It can therefore be advantageous to mount the source so as to direct the beam onto the reading volume so that it will strike an article with near normal incidence. By near normal incidence means ±5, 10 or 20 degrees. Alternatively, the beam can be directed to have oblique incidence on the articles. This will usually have a negative influence in the case that the beam is scanned over the article.
  • It is also noted that in the readers described in the detailed description, the detector arrangement is arranged in reflection to detect radiation back scattered from the reading volume. However, if the article is transparent, the detectors could be arranged in transmission.
  • In one group of embodiments, the data acquisition and processing module is operable to further analyse the data points to identify a signal component that follows a predetermined encoding protocol and to generate a predetermined characteristic signature therefrom. The characteristic of the predetermined encoding protocol is envisaged to be based on contrast, i.e. scatter signal strength, in most embodiments. In particular, a conventional bar code protocol may be used in which the bar code is printed or otherwise applied to the article in the form of stripes in the case of a ID barcode or more complex patterns for a 2D bar code. In this case, the data acquisition and processing module can be operable to perform a comparison to establish whether the predetermined characteristic signature matches the characteristic signature obtained by reading an article that has been placed in the reading volume. Consequently, an article such as a piece of paper, can be marked to bear a digitally signed version of its own characteristic signature, such as a barcode. The predetermined characteristic signature should be obtained from the article's characteristic signature with a one-way function, i.e. using an asymmetric encryption algorithm that requires a private key. This acts as a barrier to an unauthorised third party with a reader, who wants to read fake articles and print on them a label that represents the reader's scan according to the encryption scheme. Typically the bar code label or other mark would represent a cryptogram decipherable by a public key, and the private key would be reserved for the authorised labellor party.
  • A database of signatures, such as the predetermined characteristic signature or a class signature, may be provided. The data acquisition and processing module may be operable to access the database and perform a comparison to establish whether the database contains a match to the characteristic signature or class signature of an article that has been placed in the reading volume. The database may be part of a mass storage device that forms part of the reader apparatus, or may be at a remote location and accessed by the reader through a telecommunications link. The telecommunications link may take any conventional form, including wireless and fixed links, and may be available over the Internet. The data acquisition and processing module may be operable, at least in some operational modes, to allow a characteristic signature or class signature to be added to the database if no match is found. This facility will usually only be allowed to authorised persons for obvious reasons.
  • When using a database, in addition to storing a signatures, it may also be useful to associate the signatures in the database with other information about the article such as a scanned copy of the document a photograph of a passport holder, details on the place and time of manufacture of the product, or details on the intended sales destination of vendable goods (e.g. to track grey importation).
  • Reader apparatuses as described above may be used in order to populate a database with characteristic signatures by reading a succession of articles, e.g. in a production line, and/or in order subsequently to verify authenticity of an article, e.g. in field use.
  • The invention allows identification of articles made of a variety of different kinds of generally compacted fibrous sheet materials, such as paper and cardboard.
  • Various embodiments of the invention allow it to be ascertained whether an article has been tampered with. This is possible if adhesively bonded transparent films, such as adhesive tape, cover the scanned area used to create the characteristic signature. If the tape must be removed to tamper with the article, e.g. to open a packaging box, the adhesive bonding can be selected so that it will inevitably modify the underlying surface. Consequently, even if similar tape is used to reseal the box, this will be detectable.
  • By paper or cardboard we mean any article made using a wood pulp process. The paper or cardboard may be treated with coatings or impregnations or covered with transparent material, such as cellophane. If long-term stability of the surface is a particular concern, the paper may be treated with an acrylic spray-on transparent coating, for example.
  • The invention is considered to be particularly useful for paper or cardboard articles from die following list of examples:
    • 1. valuable documents such as share certificates, banknotes, bills of lading, passports, intergovernmental treaties, statutes, driving licences, vehicle roadworthiness certificates, any certificate of authenticity
    • 2. any document for tracing or tracking purposes, e.g. envelopes for mail systems
    • 3. packaging of vendable products
    • 4. brand labels on designer goods, such as fashion items
    • 5. packaging of cosmetics, pharmaceuticals, or other products.
  • The invention also allows identification of articles of a variety of different types, including packaging, documents, and clothing. The article may be contained in packaging, and optionally the packaging may be sealed in a tamper-proof manner. Alternatively, the packaging may be an appendage to the article, such as a tag secured with a connector that cannot be released without being visibly damaged. This may be especially useful for pharmaceutical products, cosmetic goods and perfume, and spare parts for aircraft or land or water vehicles, for example.
  • In summary, the characteristic signature or class signature can in some cases be obtained from something ancillary to a vendable product, such as its packaging, and in other cases obtained from the object itself, such as from surface structure of a document, or a vendable product. The invention may find many practical applications, for example to control grey market importation or counterfeiting. For such applications, portable readers could be used by customs officers or trading standards officers.
  • The characteristic signature or class signature can be encoded as a digital signature for most applications. Typical sizes of a digitally encoded characteristic signature with current technology would be in the range 200 bits to 8 k bits, where currently it is preferable to have a digital signature size of about 2 k bits for high security. The class signature may be encoded using fewer bits than the characteristic signature since it provides a less secure mechanism for identifying articles. The digitally encoded signatures may themselves be encoded using an encryption algorithm.
  • BRIEF DESCRIPTION OF THE DRAWINGS
  • For a better understanding of the invention and to show how the same may be carried into effect reference is now made by way of example to the accompanying drawings in which:
  • FIG. 1 is a schematic side view of a reader apparatus embodying the invention;
  • FIG. 2 is a schematic perspective view showing how the reading volume of the reader apparatus is sampled n times by scanning an elongate beam across it;
  • FIG. 3 is a block schematic diagram of the functional components of the reader apparatus;
  • FIG. 4 is a perspective view of an embodiment of a reader apparatus showing its external form;
  • FIG. 5 is a schematic perspective view of an alternative embodiment of the reader apparatus;
  • FIG. 6A shows schematically in side views an alternative imaging arrangement for a reader embodying the invention based on directional light collection and blanket illumination;
  • FIG. 6B shows schematically in plan view the optical footprint of a further alternative imaging amusement for a reader embodying the invention in which directional detectors are used in combination with localised illumination with an elongate beam;
  • FIG. 7A shows data a set of data points taken from a single photodetector after linerisation with the encoder signal;
  • FIG. 7B shows a FT of the set of data points shown in FIG. 7A;
  • FIG. 8A shows how the amplitude of an FT peak varies as paper is rotated with respect to a scan direction;
  • FIG. 8B shows how the wavelength of a strongest FT peak varies with angle as paper is rotated with respect to a scan direction;
  • FIG. 9 shows a flow diagram showing how a class side is measured from an article and authenticated or recorded;
  • FIG. 10A shows raw data from a single photodetector using the reader of FIG. 1 which consists of a photodetector signal and an encoder signal;
  • FIG. 10B shows the photodetector data of FIG. 10A after linearisation with the encoder signal and averaging the amplitude;
  • FIG. 10C shows the data of FIG. 10B after digitisation according to the average level;
  • FIG. 11 is a flow diagram showing how a characteristic signature of an article is generated from a scan;
  • FIG. 12 is a flow diagram showing how a signature of an article obtained from a scan can be verified against a signature database;
  • FIG. 13A shows a rotary scanner for use in a rotary scanning apparatus for determining a class signature from an article made of paper or cardboard;
  • FIG. 13B shows a lid for fitting to the housing of the rotary scanner shown in FIG. 13A;
  • FIGS. 14A and 14B together illustrate a flow diagram showing how a class signature is measured from an article using a rotary scan and authenticated or recorded;
  • FIG. 15 is a flow diagram showing how an apparatus according to an embodiment of the invention operates; and
  • FIGS. 16A to 16G schematically show various bespoke screens embodying the invention.
  • DETAILED DESCRIPTION
  • FIG. 1 is a schematic side view of a reader apparatus 1 embodying the invention. The optical reader apparatus 1 is for measuring a class signature and a characteristic signature from an article (not shown) arranged in a reading volume of the apparatus. The reading volume is formed by a reading aperture 10 which is a slit in a housing 12. The housing 12 contains the main optical components of the apparatus. The slit has its major extent in the x direction (see inset axes in the drawing). The principal optical components are a laser source 14 for generating a coherent laser beam 15 and a detector arrangement 16 made up of a plurality of k photodetector elements, where k=4 in this example, labelled 16 a, 16 b, 16 c and 16 d. The laser beam 15 is focused by a cylindrical lens 18 into an elongate focus extending in the y direction (perpendicular to the plane of the drawing) and lying in the plane of the reading aperture. In an example prototype reader, the elongate focus has a major axis dimension of about 2 mm and a minor axis dimension of about 40 micrometres. These optical components are contained in a subassembly 20. In the illustrated embodiment, the four detector elements 16 a . . . d are distributed either side of the beam axis offset at different angles in an interdigitated arrangement from the beam axis to collect light scattered in reflection from an article present in the reading volume. In an example prototype, the offset angles are −70, −20, +30 and +50 degrees. The angles either side of the beam axis are chosen so as not to be equal so that the data points they collect are as independent as possible. All four detector elements are arranged in a common plane. The photodetector elements 16 a . . . d detect light scattered from an article placed on the housing when the coherent beam scatters from the reading volume. As illustrated, the source is mounted to direct the laser beam 15 with its beam axis in the z direction, so that it will strike an article in the reading aperture at normal incidence.
  • Generally it is desirable that the depth of focus is large, so that any differences in the article positioning in the z direction do not result in significant changes in the size of the beam in the plane of the reading aperture. In an example prototype, the depth of focus is approximately 0.5 mm which is sufficiently large to produce good results.
  • The parameters, of depth of focus, numerical aperture and working distance are interdependent, resulting in a well known trade off between spot size and depth of focus.
  • A drive motor 22 is arranged in the housing 12 for providing linear scanning motion of the optics subassembly 20 via suitable bearings 24 or other means, as indicated by the arrows 26. The drive motor 22 thus serves to move the coherent beam linearly in the x direction over the reading aperture 10 so that the beam 15 is scanned in a direction transverse to the major axis of the elongate focus. Since the coherent beam 15 is dimensioned at its focus to have a cress-section in the xz plane (plane of the drawing) that is much smaller that a projection of the reading volume in a plane normal to the coherent beam, i.e. in the plane of the housing wall in which the reading aperture is set, a scan of the drive motor 22 will cause the coherent beam 15 to sample many different parts of the reading volume under action of the drive motor 22.
  • FIG. 2 is included to illustrate sampling provided by scanning and is a schematic perspective view showing how the reading area is sampled n times by scanning an elongate beam across it. The sampling positions of the focused laser beam as it is scanned along the reading aperture under action of the drive is represented by the adjacent rectangles numbered 1 to n which sample an area of length ‘l’ and width ‘w’. Data collection is made so as to collect signal at each of the n positions as the drive is scanned along the slit Consequently, a sequence of k×n data points are collected that relate to scatter from the n different illustrated parts of the reading volume. Each detector k thus has an associated sequence of a data points obtained at different times as the coherent beam scans the reading volume.
  • Also illustrated schematically are distance marks 28 formed on the underside of the housing 12 adjacent the slit 10 along the x direction, i.e. the scan direction. An example spacing between the marks in the x direction is 300 micrometres. These marks are sampled by a tail of the elongate focus and provide for linearisation of the data in the x direction, as is described in more detail further below. The measurement is performed by an additional phototransistor 19 which is a directional detector arranged to collect light from the area of the marks 28 adjacent the slit.
  • In an alternative embodiment, the marks 28 are read by a dedicated encoder emitter/detector module 19 that is part of the optics subassembly 20. Encoder emitter/detector modules are used in bar code readers. For example, we have used an Agilent HEDS-1500 module that is based on a focused light emitting diode (LED) and photodetector. The module signal is fed into the PIC ADC as an extra detector channel.
  • Typically, imprinted features provided on paper during the manufacturing process have a periodicity of between about 200 μm to 600 μm. Sampling of the data points should thus be made at least every 100 μm or less in order to detect the smallest likely imprinted features that may be present. In one mode of operation, the apparatus can perform a swift but relatively coarse initial scan to obtain one data point every 90 μm or so in order to populate the sets of data points for the k detectors. One or more of the sets of data points can then be analysed using the techniques described below to determine the class signature. If a match to the class signature is found the apparatus may then seek to measure the unique characteristic signature of the individual article.
  • Subsequently, or alternatively, a finer resolution scan may be made. This scan can be used to measure the characteristic signature, or both the class signature and the characteristic signature. For example, with an example minor dimension of the focus of 40 micrometers, and a scan length in the x direction of 2 cm, n=500, giving 2000 data points with k=4. A typical range of values for k×n depending on desired security level, article type, number of detector channels ‘k’ and other factors is expected to be 100<k×n<10,000. It has also been found that increasing the number of detectors k also improves the insensitivity of the measurements to surface degradation of the article through handling, printing etc. In practice, with the prototypes used to date, a rule of thumb is that the total number of independent data points, i.e. k×n, should be 500 or more to give an acceptably high security level with a wide variety of surfaces.
  • FIG. 3 is a block schematic diagram of the functional components of the reader apparatus. The motor 22 is connected to a programmable interrupt controller (PIC) 30 through an electrical link 23. The detectors 16 a . . . d of the detector module 16 are connected through respective electrical connection lines 17 a . . . d to an analogue-to-digital converter (ADC) that is part of the PIC 30. A similar electrical connection line 21 connects the marker reading detector 19 to the PIC 30. It will be understood that optical or wireless links may be used instead of, or in combination with, electrical links. The PIC 30 is interfaced with a personal computer (PC) 34 through a serial connection 32. The PC 34 may be a desktop or a laptop. As an alternative to a PC, other intelligent devices may be used, for example a personal digital assistant (PDA) or a dedicated electronics unit. The PIC 30 and PC 34 collectively form a data acquisition and processing module 36 for determining a signature of the article from the set of data points collected by the detectors 16 a . . . d. The PC 34 has access through an interface connection 38 to a database (dB) 40. The database 40 may be resident on the PC 34 in memory, or stored on a drive thereof. Alternatively, the database 40 may be remote from the PC 34 and accessed by wireless communication, for example using mobile telephony services or a wireless local area network (LAN) in combination with the internet. Moreover, the database 40 may be stored locally on the PC 34, but periodically downloaded from a remote source.
  • The database 40 contains a library of previously recorded class and characteristic signatures. In a variant upon this embodiment, the database 40 only contains a library of predetermined class signatures. The PC 34 is programmed so that in use it accesses the database 40 and performs a comparison to establish whether the database 40 contains a match to the signature of the article that has been placed in the reading volume. The PC 34 may also be programmed to allow a signature to be added to the database if no match is found. This mode of use is reserved for use by authorised users and may be omitted from systems that are to be used in the field exclusively for verification purposes.
  • FIG. 4 is a perspective view of the reader apparatus 1 showing its external form. The housing 12 and slit-shaped reading aperture 10 are evident. A physical location aid 42 is also apparent and is provided for positioning an article of a given form in a fixed position in relation to the reading aperture 10. In the illustrated example, the physical location aid 42 is in the form of a right-angle bracket in which the corner of a document or packaging box can be located. This ensues that the same part of the article can be positioned in the reading aperture 10 whenever the article needs to be scanned. A simple angle bracket or equivalent is sufficient for articles with a well-defined corner, such as sheets of paper, passports, ID cards and packaging boxes.
  • A document feeder could be provided to ensure that the article placement was consistent. For example, the apparatus could follow any conventional format for document scanners, photocopiers or document management systems. For packaging boxes, an alternative would be to provide a suitable guide hole, for example a rectangular cross-section hole for accepting the base of a rectangular box or a circular cross-section hole for accepting the base of a tubular box (i.e. cylindrical box).
  • A physical location aid 42 is provided where the reader apparatus 1 checks both class signatures and characteristic signatures. However, this feature or its functional equivalent need not be present in variants of the reader apparatus 1 which only perform a check for class signatures.
  • FIG. 5 is a schematic perspective view of an alternative embodiment showing a reader apparatus 1′ intended for screening batches of articles. The reader is based on a conveyor belt 44 on which articles of packaging can be placed, only one article 5 being illustrated for simplicity of representation. A reading area 10′ on the article 5 is scanned by a static laser beam 15 as the article 5 passes on the conveyor belt 44. The laser beam 15 is generated by a laser source 14 arranged fixed in position beside the conveyor belt 44. The laser source 14 has an integral bean focusing lens (not shown) for producing a pencil-like near-collimated beam that ravels in the z direction (i.e. horizontal to the floor) to pass over the conveyor belt 44 at a height A′, thereby intersecting with the article 5 at a height A′ to scan over the reading area 10′. The beam cross-section may be a spot i.e. circular (e.g. produced with integral spherical lens), or a line extending in the y direction (e.g. produced with integral cylindrical lens). Although only one article is shown, it will be appreciated that a stream of similar articles can be conveyed and scanned in succession as they pass through the beam 15.
  • The functional components of the conveyor-based reader apparatus are similar to those of the stand-alone reader apparatus described further above. The only difference of substance is that the article is moved rather than the laser beam, in order to generate the desired relative motion between scan beam and article.
  • It is envisaged that the conveyor-based reader can be used in a production line or warehouse environment for populating a database with class/characterisation signatures by reading a succession of articles. As a control, each article may be scanned again to verify that the recorded signature can be verified. This could be done with two systems operating in series, or one system through which each article passes twice. Batch scanning could also be applied at point of sale (POS), or using a reader apparatus that was based on POS equipment components.
  • The above-described embodiments are based on localised excitation with a coherent light beam of small cross-section in combination with detectors that accept light signal scattered over a much larger area that includes the local area of excitation. It is possible to design a functionally equivalent optical system which is instead based on directional detectors that collect light only from localised areas in combination with excitation of a much larger area.
  • FIG. 6A shows schematically in side view such an imaging arrangement for a reader embodying the invention which is based on directional light collection and blanket illumination with a coherent beam. An array detector 48 is arranged in combination with a cylindrical microlens array 46 so that adjacent strips of the detector array 48 only collect light from corresponding adjacent strips in the reading volume. With reference to FIG. 2, each cylindrical microlens is arranged to collect light signal from one of the n sampling strips. The coherent illumination can then take place with blanket illumination of the whole reading volume (not shown in the illustration).
  • A hybrid system with a combination of localised excitation and localised detection may also be useful in some cases.
  • FIG. 6B shows schematically in plan view the optical footprint of such a hybrid imaging arrangement for a reader embodying the invention in which directional detectors are used in combination with localised illumination with an elongate beam. This embodiment may be considered to be a development of the embodiment of FIG. 1 in which directional detectors are provided. In this embodiment three banks of directional detectors are provided, each bank being targeted to collect light from different portions along the ‘l×w’ excitation strip. The collection area from the plane of the reading volume are shown with the dotted circles, so that a first bank of, for example 2, detectors collects light signal from the upper-portion of the excitation strip, a second bank of detectors collects light signal from a middle portion of the excitation strip and a third bank of detectors collects light from a lower portion of the excitation strip. Each bank of detectors is shown having a circular collection area of diameter approximately 1/m, where m is the number of subdivisions of the excitation strip, where m=3 in the present example. In this way the number of independent data points can be increased by a factor of m for a given scan length l. As described fierier below, one or more of different banks of directional detectors can be used for a purpose other than collecting light signal that samples a speckle pattern. For example, one of the banks may be used to collect light signal in a way optimised for barcode scanning. If this is the case it will generally be sufficient for that bank to contain only one detector, since there will be no advantage obtaining cross-correlations when only scanning for contrast.
  • Having now described the principal structural components and functional components of various reader apparatuses suitable for carrying out the invention, the numerical processing used to determine class and characteristic signatures are now described. It will be understood that this numerical processing is implemented for the most part in a computer program that runs on the PC 34 with some elements subordinated to the PIC 30.
  • FIG. 7A shows data a set of data points taken from a single photodetector 16 a . . . d of the reader of FIG. 1 after linearisation with the encoder signal. The point number of the x-axis corresponds to data points sampled from a standard A4 sheet of paper placed in the reading volume and scanned by the coherent beam.
  • FIG. 7B shows a FT of linearised set of data points shown in FIG. 7A.
  • While the data points in FIG. 7A appear to be largely random, one notices in FIG. 7B a strong peak at a wavelength of 422 μm We have derived the same class signature at different places on the surface of the paper sheet, and for different sheets taken from the same ream. A similar scan and FT using a sheet of paper from a different manufacturer yielded a peak wavelength of 287 μm, indicating how the peak wavelength can be used to provide a class signature that can discriminate between papers made on different meshes.
  • The wavelength of the FT peak is found to depend upon the direction in which the paper is oriented with respect to the coherent beam scan direction. For example, the first paper sheet yielded a peak wavelength of 422 μm when scanned in the ‘portrait’ orientation, and a peak wavelength of 274 μm when scanned in the ‘landscape’ orientation. Additionally, one side of the paper often gives a stronger FT peak than the other side. We believe this to be due to the stronger surface corrugations arising on the side of the paper which was in contact with the mesh during the paper's manufacture.
  • We have performed robustness tests on paper in order to see if natural and intentional degradation and damage to the paper causes the class signature to change or become unreadable. In particular, we have crumpled the paper and rubbed its surface strongly. No strong change was found in the class signature, although more noise appeared at the lower wavelength end of the spectra. We have also exposed the paper to high pressure steam in a medical autoclave. While the FT peak was still clearly visible after autoclaving, its wavelength was found to have reduced by 1.7% from 426 μm to 418 μm. We attribute this to shrinking of the paper fibres upon drying out from the steam. Visual inspection of the paper showed it to have strongly degraded in the autoclave. However, this degree of damage is not expected for normal applications.
  • FIG. 8A shows how the amplitude of an Fr peak varies as the paper is rotated through 90° with respect to the scan direction. The indentations of the paper are believed to form a rectangular grid of dimensions 408 μm×274 μm. At 0° the beam scanning direction is normal to the 408 μm periodically spaced grid indentations. Strong signals appear at about 0°, 45° and 90°. The 90° signal arises when the scanning direction is normal to the 274 μm periodically spaced grid indentations.
  • FIG. 8B shows how the wavelength of the strongest FT peak varies with angle from as the paper is rotated with respect to the scan direction. The wavelength of the strongest FT peak is pretty much constant at around 408 μm as the angle is rotated from 0° to about 10°. We find that the peak in the FT corresponding to the class signature is best detected when the scanning laser direction is within approximately ±10° of the long axes of the surface ripples coming from the fabrication mesh. This is because the projection of the elongated laser spot (approximately 2 mm long) becomes comparable to the spacing between ripples once the rotation angle exceeds about 10°.
  • FIG. 9 is a flow diagram showing how a class signature is measured from an article and authenticated or recorded.
  • Step A1 is the initial step during which the scan motor is started. The scan motor is programmed to move at speed V.
  • Step A2 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan. The time interval between sample points is Δt. Simultaneously, the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then an encoder signal need not be acquired. The data is acquired by the PIC 30 taking data from the ADC 31. The data points are transferred in real time from the PIC 30 to the PC 34. Alternatively, the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan. The number n of data points per detector channel collected in each scan is defined as N in the following. Further, the value ak(i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N. Examples of two raw data sets obtained from such a scan are illustrated in FIG. 10A.
  • Step A3 is a return scan head step. The scan motor is reversed to reset the scanning mechanism to its initial position in preparation for a subsequent scanning operation.
  • Step A4 is an optional linearisation step. If performed, this step applies numerical interpolation to locally expand and contract ak(i) so that the encoder transitions are evenly spaced in time. This corrects the set of data points for local variations in the motor speed. This step is performed in the PC 34 under computer program control.
  • Step A5 is a FT step in which an Fr amplitude spectrum Ak(i) of the Fourier Transform of ak(i) is calculated This step is performed in the PC 34 under computer program control by application of a fast Fourier transform (FI) to individual of the k sets of data points. Optionally, an averaged FT amplitude spectrum can be calculated from respective of the k individual amplitude spectra.
  • Step A6 is an identification step in which the value of i which maximises Ak(i), excluding Hi (the DC component), is identified. This index, ipeak, is identified in the PC 34 under computer program control.
  • Step A7 is a calculating step in which the wavelength associated with ipeak is determined in the PC 34 according to the equation λpeak=2π(ipeak×v Δt). The peak wavelength λpeak is then used as the class signature.
  • Step A8 is a decision point If an article is having its class signature recorded the next step will be Step A9. Whereas if an article is being authenticated by a measurement of its class signature the next step will be Step A10. The PC 34 is programmed to determine which step follows step A8.
  • Step A9 is a step of storing a class signature. A record comprising the class signature value λpeak associated to a description of the paper is stored by the PC 34 in the database 40. The database 40 may be remotely located from the optical reader apparatus 1, and the record may be securely encrypted prior to transmission therebetween.
  • Step A10 is a step of verifying a class signature. The PC 34 compares λpeak with all entries in the database 40, until a match is found to within a predefined error margin. The PC 34 then displays the record entry description for the matching paper type, if any is found. If no matching entry is found, the PC 34 may optionally seek to extend a search to other databases. Optionally, a message stating that no match is available may be displayed Optionally, whether or not any class match is found, the PC 34 may subsequently seek to perform an analysis to determine whether a characteristic signature from the article matches a predetermined characteristic signature in order to attempt to uniquely identify the article.
  • FIG. 10A shows raw data from a single one of the photodetectors 16 a . . . d of the reader of FIG. 1. The graph plots signal intensity I in arbitrary units (a.u.) against point number n (see FIG. 2). The higher trace fluctuating between I=0-250 is the raw signal data from photodetector 16 a. The lower trace is the encoder signal picked up from the markers 28 (see FIG. 2) which is at around I=50.
  • FIG. 10B shows the photodetector data of FIG. 10A after linearisation with the encoder signal. In addition, the average of the intensity has been computed and subtracted from the intensity values. The processed data values thus fluctuate above and below zero.
  • FIG. 10C shows the data of FIG. 10B after digitisation to provide a characteristic signature. The digitisation scheme adopted is a simple binary one in which any positive intensity values are set at value 1 and any negative intensity values are set at zero. It will be appreciated that multi-state digitisation could be used instead, or any one of many other possible digitisation approaches. The main important feature of the digitisation is merely that the same digitisation scheme is applied consistently.
  • FIG. 11 is a flow diagram showing how a characteristic signature of an article is generated from a scan.
  • Step S1 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan. Simultaneously, the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then linearisation of the data may not be required. The data is acquired by the PIC 30 taking data from the ADC 31. The data points are transferred in real time from the PIC 30 to the PC 34. Alternatively, the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan. The number n of data points per detector channel collected in each scan is defined as N in the following. Further, the value ak(i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N. Examples of two raw-data sets obtained from such a scan are illustrated in FIG. 10A.
  • Step S2 uses numerical interpolation to locally expand and contract ak(i) so that the encoder transitions are evenly spaced in time. This corrects for local variations in the motor speed. This step is performed in the PC 34 by a computer program.
  • Step S3 is an optional step. If performed, this step numerically differentiates the data with respect to time. It may also be desirable to apply a weak smoothing function to the data. Differentiation may be useful for highly structured surfaces, as it serves to attenuate uncorrelated contributions from the signal relative to correlated (speckle) contributions.
  • Step S4 is a step in which, for each photodetector, the mean of the recorded signal is taken over the N data points. This mean value corresponds to the artefact signal referred to previously. For each photodetector, this mean value is subtracted from all of the data points so that the data are distributed about zero intensity. Reference is made to FIG. 10B which shows an example of a scan data set after linearisation and subtraction of a computed average.
  • Step S5 digitises the analogue photodetector data to compute a digital signature representative of the scan. The digital signature is obtained by applying the rule: ak(i)>0 maps onto binary ‘1’ and ak(i)<=0 maps onto binary ‘0’. The digitised data set is defined as dk(i) where i runs from 1 to N. The signature of the article may advantageously incorporate further components in addition to the digitised signature of the intensity data just described. These further optional signature components are now described.
  • Step S6 is an optional step in which a smaller ‘thumbnail’ digital signature is created. This is done either by averaging together adjacent groups of m readings, or more preferably by picking every cth data point, where c is the compression factor of the thumbnail. The latter is preferred since averaging may disproportionately amplify noise. The same digitisation rule used in Step 5S is then applied to the reduced data set. The thumbnail digitisation is defined as tk(i) where i runs 1 to N/c and c is the compression factor.
  • Step S7 is an optional step applicable when multiple detector channels exist. The additional component is a cross-correlation component calculated between the intensity data obtained from different ones of the photodetectors. With 2 channels there is one possible cross-correlation coefficient, with 3 channels up to 3, and with 4 channels up to 6 etc. The cross-correlation coefficients are useful, since it has been found that they are good indicators of material type. They may thus be used to corroborate information derived from analysing the class signature. For example, for a particular type of document, such as a passport of a given type, or laser printer paper, the cross-correlation coefficients always appear to lie in predictable ranges. A normalised cross-correlation can be calculated between ak(i) and al(i), where k≠l and k,l vary across all of the photodetector channel numbers. The normalised cross-correlation function r is defined as
  • Γ ( k , l ) = i = 1 N a k ( i ) a l ( i ) ( i = 1 N a k ( i ) 2 ) ( i = 1 N a l ( i ) 2 )
  • The use of the cross-correlation coefficients in verification processing of characteristic signatures is described further below.
  • Step S8 is another optional step which is to compute a simple intensity average value indicative of the signal intensity distribution. This may be an overall average of each of the mean values for the different detectors or an average for each detector, such as a root mean square (rms) value of ak(i). If the detectors are arranged in pairs either side of normal incidence as in the reader described above, an average for each pair of detectors may be used. The intensity value has been found to be a good crude filter for material type, since it is a simple indication of overall reflectivity and roughness of the sample. For example, one can use as the intensity value the unnormalised rms value after removal of the average value, i.e. the DC background.
  • The signature data obtained from scanning an article can be compared against records held in a signature database for verification purposes and/or written to the database to add a new record of the signature to extend the existing database.
  • A new database record will include the digital signature obtained in Step S5 as well as optionally its smaller thumbnail version obtained in Step S6 for each photodetector channel, the cross-correlation coefficients obtained in Step S7 and the average value(s) obtained in Step S8. Alternatively, the thumbnails may be stored on a separate database of their own optimised for rapid searching, and the rest of the data (including the thumbnails) on a main database.
  • FIG. 12 is a flow diagram showing how a characteristic signature of an article obtained from a scan can be verified against a predetermined characteristic signature database.
  • In a simple implementation, the database could simply be searched to find a match based on the fall set of characteristic signature data. However, to speed up the verification process, the process preferably uses the smaller thumbnails and pre-screening based on the computed average values and cross-correlation coefficients as now described.
  • Verification Step V1 is the first step of the verification process, which is to scan an article according to the process described above, i.e. to perform Scan Steps S1 to S8.
  • Verification Step V2 takes each of the thumbnail entries and evaluates the number of matching bits between it and tk(i+j), where j is a bit offset which is varied to compensate for errors in placement of the scared area. The value of j is determined and then the thumbnail entry which gives the maximum number of matching bits. This is the ‘hit’ used for further processing.
  • Verification Step V3 is an optional pre-screening test that is performed before analysing the full digital signature stored for the record against the scanned digital signature. In this pre-screen, the rms values obtained in Scan Step S8 are compared against the corresponding stored values in the database record of the hit. The ‘hit’ is rejected from further processing if the respective average values do not agree within a predefined range. The article is then rejected as non-verified (i.e. jump to Verification Step V6 and issue fail result).
  • Verification Step V4 is a further optional pre-screening test that is performed before analysing the full digital signature. In this pre-screen, the cross-correlation coefficients obtained in Scan Step S7 are compared against the corresponding stored values in the database record of the hit. The ‘hit’ is rejected from further processing if the respective cross-correlation coefficients do not agree within a predefined range. The article is then rejected as non-verified (i.e. jump to Verification Step V6 and issue fail result). Optionally, pre-screening may be based upon the results of an article's class signature.
  • Verification Step V5 is the main comparison between the scanned digital signature obtained in Scan Step S5 and the corresponding stored values in the database record of the hit. The full stored digitised signature, dk db(i) is split into n blocks of q adjacent bits on k detector channels, i.e. there are qk bits per block A typical value for q is 4 and a typical value for k is 4, making typically 16 bits per block. The qk bits are then matched against the qk corresponding bits in the stored digital signature dk db(i+j). If the number of matching bits within the block is greater or equal to some pre-defined threshold Z then the number of matching blocks is incremented. A typical value for zthresh is 13. This is repeated for all n blocks. This whole process is repeated for different offset values of j, to compensate for errors in placement of the scanned area, until a maximum number of matching blocks is found Defining M as the maximum number of matching blocks, the probability of an accidental match is calculated by evaluating:
  • p ( M ) = w = n - M n s w ( 1 - s ) n - w w n C
  • where s is the probability of an accidental match between any two blocks (which in turn depends upon the chosen value of zthreshold), M is the number of matching blocks and p(M) is the probability of M or more blocks matching accidentally. The value of s is determined by comparing blocks within the data base from scans of different objects of similar materials, e.g. a number of scans of paper documents etc. For the case of q=4, k=4 and zthreshold=13, we find a typical value of s is 0.1. If the qk bits were entirely independent then probability theory would give s=0.01 for zthreshold=3. The fact that we find a higher value empirically is because of correlations between the k detector channels and also correlations between adjacent bits in the block due to a finite laser spot width. A typical scan of a piece of paper yields around 314 matching blocks out of a total number of 510 blocks, when compared against the data base entry for that piece of paper. Setting M=314, n=510, s=0.1 for the above equation gives a probability of an accidental match of 10−177.
  • Verification Step V6 issues a result of the verification process. The probability result obtained in Verification Step V5 may be used in a pass/fail test in which the benchmark is a pre-defined probability threshold. In this case the probability threshold may be set at a level by the system or may be a variable parameter set at a level chosen by the user. Alternatively, the probability result may be output to the user as a confidence level, either in raw form as the probability itself, or in a modified form using relative terms (e.g. no match/poor match/good match/excellent match) or other classification.
  • It will be appreciated that many variations are possible. For example, instead of treating the cross-correlation coefficients as a pre-screen component, they could be treated together with the digitised intensity data as part of the ma signature. For example the cross-correlation coefficients/class signatures could be digitised and added to the digitised intensity data. The cross-correlation coefficients/class signatures could also be digitised on their own and used to generate bit strings or the like which could then be searched in the same way as described above for the thumbnails of the digitised intensity data in order to find the hits.
  • The above examples related to a linear scanner in which the article is scanned in one direction only. In such a scanner, the article, or more specifically the imprint pattern, needs to be aligned in a controlled and reproducible manner. A rotary scanner which overcomes this restriction by scanning all possible directions is now described.
  • FIG. 13A shows a rotary scanner 100 for use in a rotary scanning apparatus for determining a class signature from an article made of paper or cardboard. The scanner 100 comprises a scan head 102 rotatably mounted in a housing 110. The scan head 102 is mounted on a rotating arm 104 adjacent a position encoder module 106. The rotating arm is operably coupled to a drive motor 108.
  • FIG. 13B shows a lid 120 for fitting to the housing 110 of rotary scanner 100 shown in FIG. 13A. The lid 120 comprises a flat face portion 122 having an arcuate slot 124 defined therein. The arcuate slot 124 subtends an angle of 360° minus the angle 126. In this embodiment, the acuate slot 124 subtends an angle of 270°. This allows the scan head 102 to scan over approximately 270 degrees of an arc, thus sampling all possible orientations of the paper.
  • The rotary scanning apparatus shown in FIGS. 13A and 13B can be incorporated into scanning system similar to the linear scanning apparatus previously described. In this case, the linear scanning apparatus sensing system is replaced by the rotary version of FIGS. 13A and 13B, whilst the data processing apparatus is reprogrammed to implement the method described below in relation to FIG. 14.
  • There are two principal advantages of this embodiment. Firstly, there is no need to know the relative orientation of the paper and the scanner, since the fit between the observed set of spectra and the database of paper types can be done for different starting angles, until a match is obtained. This means that the scanner can be dropped down anywhere on the paper surface and a class signature reported. Secondly, a greater level of security is provided, since the class signature can now be composed of a combination of features taken from different scan directions. For example, the transformed set of data points forming the class signature could be used to pick out the two distinct periodicities of a rectangular mesh structure. Another example would be to determine the order of rotational symmetry of a mesh, such as to identify a hexagonal mesh of a given periodicity and distinguish it from a square mesh of the same periodicity.
  • FIGS. 14A and 14B together illustrate a flow diagram showing how a class signature is measured from an article using a rotary scan and authenticated or recorded.
  • Step R1 is the initial step during which the scan motor is started. The scan motor is programmed to move at speed v.
  • Step R2 is a data acquisition step during which the optical intensity at each of the photodetectors is acquired approximately every 1 ms during the entire length of scan. The time interval between sample points is Δt. Simultaneously, the encoder signal is acquired as a function of time. It is noted that if the scan motor has a high degree of linearisation accuracy (e.g. as would a stepper motor) then an encoder signal need not be acquired. An encoder signal may be provided by detecting when the position encoder module 106 passes markings provided on the lid 120 adjacent the slot 124. The data is acquired by the PIC 30 taking data from the ADC 31. The data points are transferred in real time from the PIC 30 to the PC 34. Alternatively, the data points could be stored in memory in the PIC 30 and then passed to the PC 34 at the end of a scan. The number n of data points per detector channel collected in each scan is defined as N in the following. Further, the value ak(i) is defined as the i-th stored intensity value from photodetector k, where i runs from 1 to N.
  • Step R3 is a return scan head step. The scan motor is reversed to reset the scanning mechanism to its initial position in preparation for a subsequent scanning operation.
  • Step R4 is an optional linearisation step. If performed, this step applies numerical interpolation to locally expand and contract ak(i) so that the encoder transitions are evenly spaced in time. This corrects the set of data points for local variations in the motor speed. This step is performed in the PC 34 under computer program control.
  • Step R5 is an initialisation step at which i0 is set to zero.
  • Step R6 is a step in which subsets of the data points are created from the whole scan. Subsets bk(i) of ak(i) which run from I=i0−Δi to i0+ΔI are created. As indicated above in connection with FIG. 8B, ΔI should correspond to approximately 10° of the arc of the scanner.
  • Step R7 is a FT step in which an FT amplitude spectrum Bk(i) of the Fourier Transform of bk(i) is calculated. This step is performed in the PC 34 under computer program control by application of a fast Fourier transform (FT) to individual of the k sets of data points. Optionally, an averaged FT amplitude spectrum can be calculated from respective of the k individual amplitude spectra should multiple detectors be provided in the scanner head 102. Because of the shorter sequences of data used in each transform, the Fr peaks are broader and less intense than for the linear scan. Nevertheless, under certain conditions, the set of spectra form a good class signature for the paper.
  • Step R8 is an identification step in which the value of i which maximises Bk(i), excluding i=0 (the DC component), is identified. This index, ipeak, is identified in the PC 34 under computer program control.
  • Step P9 is a step at which the root mean square (r.m.s.) value of Bk(i) is determined. Calculate the r.m.s value of Bk(i), using:
  • rms = 1 2 Δ i + 1 i = 0 i = 2 Δ i ( B k ( i ) ) 2
  • For a given angular scan φ we find the maximum peak height in the amplitude spectrum and divide it by the r.m.s. value of the amplitude spectrum. We call this ratio the peak significance, since it tells us how much higher the peak is than the rest of the spectrum. Peak significances below about three to four mean there is no clearly defined peak. Peak significances above about four indicate a well defined peak. If the peak significance is above about three to four, we measure the wavelength at the centre of the peak. If the peak significance is less than about three to four, we discard the data and pass onto the next value of φ. We are thus able to plot a graph of peak wavelength against φ, but limited to the parts of the arc where a well defined peak exists. This plot forms the class signature for that scanned paper.
  • FIG. 8A shows for a real measurement from a sheet of paper the ratio of the amplitude of the strongest peak in the amplitude spectrum to the r.m.s. value of the amplitude spectrum A clearly significant peak can be seen in the angular range 0-15 degrees, with weaker peaks appearing around 45 degrees and 90 degrees. Focusing on the strongest peak close to zero degrees, FIG. 8B shows the wavelength of this peak as a function of angle. A roughly constant wavelength of 408 μm is found, which forms the class signature for this sheet of paper. The slightly upward curvature in the dependence of wavelength on angle which can be seen in FIG. 8B is due to the 1/cos(angle) projection of the wavelength as the scan direction varies.
  • Step R10 is a ratio determining step. The ratio B(ipeak/rms) is calculated and stored.
  • Step R11 is an incrementing step at which i0 is incremented Step R12 is a loop testing step which causes step R6 to be performed again unless i0=N. If i0=N then step R13 is performed.
  • Step R13 is a global peak data point determining step at which ipeak the value of i0 which maximises the ratio B(ipeak/rms) is determined.
  • Step R14 is a calculating step in which the wavelength associated with ipeak is determined in the PC 34 according to the equation λpeak=2π(ipeak×v Δt). The peak wavelength λpeak is then used as the class signature.
  • Step R15 is a decision point. If an article is having its class, signature recorded the next step will be Step R16. Whereas if an article is being authenticated by a measurement of its class signature the next step will be Step R17. The PC 34 is programmed to determine which step follows step R15.
  • Step R16 is a step of storing a class signature. A record comprising the class signature value λpeak associated to a description of the paper is stored by the PC 34 in the database 40. The database 40 may be remotely located from the optical reader apparatus 1, and the record may be securely encrypted prior to transmission therebetween.
  • Step R17 is a step of verifying a class signature. The PC 34 compares λpeak with all entries in the database 40, until a match is found to within a predefined error margin. The PC 34 then displays the record entry description for the matching paper type, if any is found. If no matching entry is found, the PC 34 may optionally seek to extend a search to other databases. Optionally, a message stating that no match is available may be displayed. Optionally, whether or not any class match is found, the PC 34 may subsequently seek to perform an analysis to determine whether a characteristic signature from the article matches a predetermined characteristic signature in order to attempt to uniquely identify the article.
  • FIG. 15 is a flow diagram showing how an apparatus according to an embodiment of the invention operates.
  • Step A1 is the start of the process. The process is under the control of the PC 34.
  • Step A2 is a step of positioning an article to be analysed in a reading volume. This step can be performed manually or automatically. For example, a sheet feeder may be used to position paper/cardboard articles in the apparatus reading volume or a hand-held scanner can be placed on the article.
  • Step A3 is a step of scanning the article. In one embodiment this involves moving the beam with respect to the article using a linear scan. However, a rotary scan of the type hereindescribed may be used to perform this step.
  • Step A4 is a step of measuring the scan position relative to the reading volume. Information relating to the position of the scanner over the time period of the scan is recorded. This step is performed by the PC 34 monitoring the scanner position by reading data from the encoder/decoder 19 via the PIC 30 whilst the scan is in progress.
  • Step A5 is a data collection step during which the set of data points are sequentially populated. Each set of data points from the detectors 16 a-d are averaged by the PC 34 and stored as an averaged set of data points.
  • Step A6 is a linearisation step. The PC linearises the set of data points prior to determining a class signature by using the relative measured position information obtained at step A4 to modify the set of data points in order to ensure that consecutive data points in the set are equally-spaced with respect to time or position of their acquisition during the scan.
  • Step A7 is a transform step. The PC 34 applies a fast Fourier transform (FFT) to the averaged set of data points. An FFT, or other transform, may be used to provide a transformed data set comprising one or more peaks.
  • Step A8 involves determining the class signature. The amplitude peaks of the transform found in step A7 are thresholded to derive a digital signal. This digital signal is used as the class signature.
  • Step A9 is a comparison step. The class signature is compared to a database of predetermined class signatures stored in the database 40.
  • Step A10 is a decision step. If no match for the class signature is found in the database 40, the apparatus proceeds to step A11. Otherwise, where a match is found for the class signature, the apparatus proceeds to implement step A12 in order to verify the characteristic signature.
  • Step A11 is a rejection step at which the apparatus can alert the operator of the apparatus that the class signature of the article has not been recognised. The operator may subsequently decide how to act upon this notification.
  • Step A12 is a step of determining a characteristic signature. This step may comprise steps of determining a characteristic signature such as are described above. However, prior to searching the database 40 for all characteristic signatures in the database to compare to the measured characteristic signature, the PC 34 can select a subset of the predetermined characteristic signatures to search. This speeds up the search for a match to the measured characteristic signature. Additionally, in this embodiment, the apparatus can use the same sets of data points obtained during the scan to derive both the class and characteristic signatures.
  • Step A13 is another decision step. If no match for the characteristic signature is found in the database 40, the apparatus proceeds to step A11 as described above.
  • Step A14 is a step that is reached if both the class and characteristic signatures are recognised. At this step various indicia or actions may occur. For example, an indication that the paper/cardboard article has been validly identified may be displayed to an operator of the apparatus, an automatic lock release may be activated, etc. as desired.
  • From the above detailed description it will be understood how an article made of material, such as paper or cardboard, can be identified by exposing the material to coherent radiation, collecting a set of data points that measure scatter of the coherent radiation from the material, and determining a class/characteristic signature of the article from the set of data points.
  • It will also be understood that the scan area is essentially arbitrary in terms of its size or location on an article. If desired, the scan could be a linear scan rastered to cover a larger two-dimensional area, for example.
  • Moreover, it will be understood how this can be applied to identify a product by its packaging, a document or a ticketed item of clothing, by exposing the article to coherent radiation, collecting a set of data points that measure scatter of the coherent radiation from intrinsic structure of the article, and determining a class/characteristic signature of the product from the set of data points.
  • From the above description of the numerical processing, it will be understood that degradation of the beam localisation (e.g. beam cross-section enlargement in the reading volume owing to sub-optimum focus of the coherent beam) will not be catastrophic to the system, but merely degrade its performance by increasing the accidental match probability. The apparatus is thus robust against apparatus variations giving a stable gradual degradation in performance rather than a sudden unstable failure. In any case, it is simple to perform a self test of a reader, thereby picking up any equipment problems, by performing an autocorrelation on the collected data to ascertain the characteristic minimum feature size in the response data.
  • A further security measure that can be applied to paper or cardboard, for example, is to adhesively bond a transparent seal (e.g. adhesive tape) over the scanned area. The adhesive is selected to be sufficiently strong that its removal will destroy the underlying surface structure which it is essential to preserve in order to perform a characteristic signature verification scan.
  • As described above, the reader may be embodied in an apparatus designed specifically to implement the invention. In other cases, the reader will be designed by adding appropriate ancillary components to an apparatus principally designed with another functionality in mind, such as a photocopier machine, document scanner, document management system, POS device, ATM, air ticket boarding card reader or other device.
  • FIG. 16A-G show bespoke screens according to various embodiments of the invention. The screens can be used in a standard paper-making process. Imprints may be provided to provide a desired class signature. Such imprints may incorporate one-dimensional or two-dimensional pattern variations. The patterns imprinted may be periodic with a periodicity that is less 1 ha, or equal to, the length of a scan in order to ensure that a scanner detects the desired frequency components of the pattern.
  • The bespoke screens can be used to replace standard paper making screens.
  • Various techniques and materials for making screens are well known in the art (for example, see references [6] to [13]), and these may also be used for bespoke screens. For example, screens may be made using wires, plates etc., formed of stainless steel, polymer materials etc.
  • FIG. 16A shows a bespoke screen 160 according to an embodiment of the invention. The bespoke screen 160 comprises a grid of wires 161 a-n spaced at regular intervals 163 in a first direction (y-axis). Spaced groups of regularly spaced individual wires 162 a-n are provided at regular intervals 164 in a second direction (x-axis) transverse to the first direction. The imprint left by this screen 160 thus has a single frequency component in the first direction. It also has two frequency components in the second direction. The first component reflects the spacing of the groups of wires 164 and the second the inter-wire spacing 165.
  • FIG. 16B shows a bespoke screen 170 according to an embodiment of the invention. The bespoke screen 170 comprises a grid of wires 171 a-n spaced at regular intervals 173 in a first direction (y-axis). Spaced groups of wires 172 a-n are provided at regular intervals 174 in a second direction (x-axis) transverse to the first direction. The groups of wires 172 a-n provided in the second direction are spaced according to a chirped pattern in which the spacing between the individual wires in the group increases linearly.
  • The imprint left by this screen thus has a single frequency component in the first direction. It also has a spread frequency signal in the second direction which derives from the chirped spatial modulation applied to the wires in the groups 172 a-n, as well as a frequency component derived from the spacing 174 between the groups in the second direction.
  • FIG. 16C shows a bespoke screen 180 according to an embodiment of the invention. The bespoke screen 180 comprises a grid of wires 181 a-n spaced at regular intervals in a first direction (y-axis). Various groups of wires 182 a-n are provided at regular intervals 184 in a second direction (x-axis) transverse to the first direction. Where one such group may have been placed, in this embodiment a group 182 c incorporating a more closely packed group of wires is provided.
  • The imprint left by this screen has a single frequency component in the first direction. It also has a three component frequency signal in the second direction. The first component reflects the spacing of the groups of wires 184 and the second the inter-wire spacing. However, a third component is also present at a frequency higher than the first component. The third component derives from the closer packing of the wires in the group 182 c.
  • By detecting the third frequency component, use during paper manufacture of a group of wires having the spacing of the group 182 c can be detected. This can be used to encode a binary signal. Other group inter-wire spacings may also be provided to enable the encoding of a sequence of binary digits or byte. As is well-known, such bytes can be used to encode various information.
  • FIG. 16D shows a bespoke screen 190 according to an embodiment of the invention. The bespoke screen 190 comprises a grid of wires 191 a-n spaced at regular intervals 193 in a first direction (y-axis). Spaced groups of wires 192 a-n are provided at regular intervals 194 in a second direction (x-axis) transverse to the first direction. The wires 192 a-n in the groups are spaced according to a sinusoidally varying pattern.
  • The imprint left by this screen has a single frequency component in the first direction It also has a spread frequency signal in the second direction which derives from the sinusoidal spatial modulation applied to the wires in the groups 192 a-n. In various embodiments, the sinusoidal spatial modulation acts as a carrier frequency that can itself be modulated to provide various encoding schemes. For example, phase shift keying modulation may be applied to the carrier sinusoid and encoded into the pattern to be applied to paper by appropriate spacing of the wires.
  • FIG. 16E shows a bespoke screen 200 according to an embodiment of the invention. The bespoke screen 200 comprises a grid of groups of wires 201 a-n spaced at regular intervals 203 in a first direction (y-axis). Wires in the groups 201 a-n are themselves spaced at regular intervals 206. Spaced groups of regularly spaced wires 202 a-n are also provided at regular intervals 204 in a second direction (x-axis) transverse to the first direction.
  • The imprint left by this screen 200 has two frequency components in the first direction and two frequency components in the second direction. The first component in the first direction reflects the spacing 203 of the groups of wires 201 a-n and the second the inter-wire spacing 206. The first component in the second direction reflects the spacing 204 of the groups of wires 202 a-n and the second the inter-wire spacing 205.
  • FIG. 16F shows a bespoke screen 210 according to an embodiment of the invention. The bespoke screen 210 comprises a plate 201 comprising a plurality of cross-shaped perforations 202 spaced in a regular two dimensional pattern. Such a screen may be formed by etching or punching a sheet material.
  • FIG. 16G shows a bespoke screen 220 according to an embodiment of the invention. The bespoke screen 220 comprises a plate 221 comprising a repeating pattern of perforations 222, 224 spaced in a regular two dimensional pattern. The pattern comprises a repeating sequence of alternating groups of circular perforations 222, 224 of different sizes and numbers set out in a grid arrangement spaced at regular intervals 223. The first group of circular perforations 222 consists of a 3×3 array of circular holes grouped together. The second group of circular perforations 224 consists of a 2×2 array of circular holes grouped together. The first and second groups 222, 224 occupy approximately the same surface area of the plate 221.
  • The imprint left by the screen 220 has a frequency component deriving from the grid interval 223 plus a more complex response arising from the groups of perforations 222, 224. Such a response can be measured and used to provide a class signature for paper/cardboard articles made using the bespoke screen 220.
  • It will be appreciated that the imprints made by the illustrated screens are all amenable to functional analysis to determine a class signature, using Fourier transforms or other kinds of transform analysis.
  • It will be appreciated that although particular embodiments of the invention have been described, many modifications/additions and/or substitutions may be made within the spirit and scope of the present invention.
  • REFERENCES
    • [1] Kravolec “Plastic tag makes foolproof ID” Technology Research News, 2 Oct. 2002
    • [2] R Anderson “Security Engineering: a guide to building dependable distributed systems” Wiley 2001, pages 251-252 ISBN 0471-38922-6
    • [3] U.S. Pat. No. 5,521,984
    • [4] U.S. Pat. No. 5,325,167
    • [5] GB 0405641.2 (as yet unpublished and incorporated herein in its entirety by reference)
    • [6] U.S. Pat. No. 4,564,051
    • [7] U.S. Pat. No. 6,546,964
    • [8] U.S. Pat. No. 4,546,964
    • [9] U.S. Pat. No. 5,152,326
    • [10] U.S. Pat. No. 5,358,014
    • [11] U.S. Pat. No. 6,546,964
    • [12] US 2004/0011491
    • [13] WO 2004/020734

Claims (33)

1. An apparatus for analysing an article made of paper or cardboard placed in a reading volume, comprising:
a scanner for scanning an article with a coherent optical beam;
a detector arrangement for collecting a set comprising groups of data points from signals obtained when the coherent beam reflects from the reading volume, wherein different ones of the groups of data points relate to signals obtained at different times during a scan of the reading volume; and
a data acquisition and processing module for processing the set of data points so as to determine whether the article possesses predetermined surface structure which gives rise to a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article.
2. The apparatus of claim 1, wherein the data acquisition and processing module is operable to analyse the set of data points to determine whether it contains class signature information indicative of periodic variations in the intrinsic properties of the article.
3. The apparatus of claim 1, wherein the data acquisition and processing module is operable to derive a measured class signature from the result of a mathematical transform applied to the data points and compare the measured class signature to one or more predetermined class signatures, wherein a match between the measured class signature and a predetermined class signature indicates that the article is of the generic type associated with the matched predetermined class signature.
4. The apparatus of claim 1, further comprising:
an encoder/detector module for measuring the relative position of the coherent beam and the article during the scan; and
wherein the data acquisition and processing module is further operable to linearise the set of data points prior to determining a class signature by using relative measured position information obtained from the encoder/detector module to modify the set of data points in order to ensure that consecutive data points in the set are equally-spaced with respect to time or position of their acquisition during the scan.
5. The apparatus of claim 1, wherein the data acquisition and processing module is further operable to determine a characteristic signature from the set of data points, the characteristic signature being for distinguishing individual articles from other articles of the same generic type.
6. The apparatus of claim 1, wherein the intrinsic properties of the article are imprints imparted to the paper or cardboard during an ordinary manufacturing process.
7. The apparatus of claim 1, wherein the scanner is operable in a linear scanning mode.
8. The apparatus of claim 1, wherein the scanner is operable in a rotary scanning mode.
9. The apparatus of claim 1, wherein the scanner is configured to project the coherent beam towards the article at near normal incidence.
10. The apparatus of claim 1, wherein the detector arrangement includes a plurality of detector channels arranged and configured to sense scatter from respective different parts of the reading volume.
11. The apparatus of claim 10, wherein the data acquisition and processing module is further operable to average a plurality of sets of data points collected from the plurality of detector channels and to determine the class signature from the averaged data set.
12. A method of analysing an article made of paper or cardboard, comprising:
placing an article in a reading volume;
scanning the article with a coherent optical beam;
collecting a set comprising groups of data points from signals obtained when the coherent beam reflects from the reading volume, wherein different ones of the groups of data points relate to signals obtained at different times during a scan of the reading volume; and
processing the set of data points to determine whether the article possesses a predetermined surface structure which rives rise to a predetermined class signature that identifies articles of a known generic type from the intrinsic properties of the article.
13. The method of claim 12, wherein processing the set of data points comprises analysing the set of data points to determine whether it contains class signature information indicative of periodic variations in the intrinsic properties of the article.
14. The method of claim 12, wherein processing the set of data points comprises deriving a measured class signature from the result of a mathematical transform applied to the data points and comparing the measured class signature to one or more predetermined class signatures, wherein a match between the measured class signature and a predetermined class signature indicates that the article is of the generic type associated with the matched predetermined class signature.
15. The method of claim 12, further comprising:
measuring the relative position of the coherent beam and the article during the scan; and
linearising the set of data points prior to determining a class signature by using the relative measured position information to modify the set of data points in order to ensure that consecutive data points in the set are equally-spaced with respect to time or position of their acquisition during the scan.
16. The method of claim 12, further comprising processing the set of data points to determine a characteristic signature from the set of data points, wherein the characteristic signature is for distinguishing individual articles from other articles of the same generic type.
17. The method of claim 12, wherein the intrinsic properties of the article are imprints imparted to the paper or cardboard during an ordinary manufacturing process.
18. The method of claim 12, wherein scanning of the article comprises performing a linear scan.
19. The method of claim 12, wherein scanning of the article comprises performing a rotary scan.
20. The method of claim 12, comprising projecting the coherent beam towards the article at near normal incidence.
21. The method of claim 12, further comprising collecting a plurality of sets of data points from a plurality of detector channels arranged and configured to sense scatter from respective different parts of the reading volume.
22. The method of claim 21, further comprising averaging the plurality of sets of data points collected from the plurality of detector channels to provide the data set subsequently used to determine the class signature.
23. A screen for manufacturing a paper or cardboard article, wherein the screen comprises a plurality of elements arranged and configured to impart a bespoke predetermined surface structure imprint pattern to a paper or cardboard article for providing a predetermined class signature that identifies the article as being of a known generic type, wherein the imprint pattern incorporates spatial modulation provided according to one or more of the following schemes: chirped modulation, surer-periodicity modulation, amplitude modulation, phase shift keying modulation, and frequency shift keying modulation.
24. The screen of claim 23, wherein the imprint pattern is periodic.
25. (canceled)
26. The screen of, claim 23, wherein the imprint pattern encodes one or more bit sequences into the paper or cardboard.
27. A method of making a paper or cardboard article including a bespoke imprint pattern, comprising using the screen of claim 23 to impart the bespoke imprint pattern to the article.
28. A paper or cardboard article comprising a bespoke predetermined surface structure imprint pattern for providing a class signature when scatter from a coherent beam incident on the article is collected, for identifying the article as belonging to a known generic type.
29. The paper or cardboard article of claim 28, wherein the imprint pattern is not visible.
30. The paper or cardboard article of claim 28, wherein the imprint pattern is periodic.
31. The paper or cardboard article of claim 28, wherein the imprint pattern incorporates spatial modulation provided according to one or more of the following schemes: chirped modulation, super-periodicity modulation, amplitude modulation, phase shift keying modulation, and frequency shift keying modulation.
32. The paper or cardboard article of claim 28, wherein the imprint pattern encodes one or more bit sequences into the paper or cardboard.
33-37. (canceled)
US11/660,073 2004-08-13 2005-07-29 Authenticity Verification Methods, Products and Apparatuses Abandoned US20080260199A1 (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
US11/660,073 US20080260199A1 (en) 2004-08-13 2005-07-29 Authenticity Verification Methods, Products and Apparatuses

Applications Claiming Priority (5)

Application Number Priority Date Filing Date Title
US60121904P 2004-08-13 2004-08-13
GB0418178.0 2004-08-13
GB0418178A GB2417074B (en) 2004-08-13 2004-08-13 Authenticity verification methods,products and apparatuses
US11/660,073 US20080260199A1 (en) 2004-08-13 2005-07-29 Authenticity Verification Methods, Products and Apparatuses
PCT/GB2005/002989 WO2006016112A1 (en) 2004-08-13 2005-07-29 Authenticity verification methods, products and apparatuses

Publications (1)

Publication Number Publication Date
US20080260199A1 true US20080260199A1 (en) 2008-10-23

Family

ID=33017527

Family Applications (1)

Application Number Title Priority Date Filing Date
US11/660,073 Abandoned US20080260199A1 (en) 2004-08-13 2005-07-29 Authenticity Verification Methods, Products and Apparatuses

Country Status (18)

Country Link
US (1) US20080260199A1 (en)
EP (1) EP1784757B1 (en)
JP (2) JP2008509497A (en)
KR (1) KR20070044050A (en)
CN (1) CN101031927B (en)
AR (1) AR050781A1 (en)
AU (1) AU2005271022A1 (en)
BR (1) BRPI0514334A (en)
CA (1) CA2576942A1 (en)
GB (3) GB2444139B (en)
HK (1) HK1086925A1 (en)
IL (1) IL181254A0 (en)
MX (1) MX2007001856A (en)
NO (1) NO20071360L (en)
RU (1) RU2391702C2 (en)
TW (1) TW200606736A (en)
WO (1) WO2006016112A1 (en)
ZA (1) ZA200701258B (en)

Cited By (18)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070187505A1 (en) * 2006-01-23 2007-08-16 Rhoads Geoffrey B Capturing Physical Feature Data
US20080112596A1 (en) * 2006-01-23 2008-05-15 Rhoads Geoffrey B Sensing Data From Physical Objects
US20080121708A1 (en) * 2006-11-15 2008-05-29 Rhoads Geoffrey B Physical Credentials and Related Methods
US7812935B2 (en) 2005-12-23 2010-10-12 Ingenia Holdings Limited Optical authentication
US7853792B2 (en) 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US8078875B2 (en) 2005-07-27 2011-12-13 Ingenia Holdings Limited Verification of authenticity
WO2013063393A1 (en) * 2011-10-27 2013-05-02 Electronic Warfare Associates, Inc. Systems and methods of device authentication including features of circuit testing and verification in connection with known board information
US8615475B2 (en) 2008-12-19 2013-12-24 Ingenia Holdings Limited Self-calibration
US8682076B2 (en) 2008-12-19 2014-03-25 Ingenia Holdings Limited Signature generation for use in authentication and verification using a non-coherent radiation source
US8699088B2 (en) 2004-03-12 2014-04-15 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US9871660B2 (en) * 2014-12-23 2018-01-16 Banco De Mexico Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
US10606536B2 (en) 2018-08-17 2020-03-31 Bank Of America Corporation Intelligent systematic physical document fulfillment system
US11025641B2 (en) 2018-08-21 2021-06-01 Bank Of America Corporation System for optimizing access control for server privilege
US11087323B2 (en) 2018-08-21 2021-08-10 Bank Of America Corporation Exposure based secure access system
US11126902B2 (en) * 2014-06-03 2021-09-21 IE-9 Technology Corp. Optically variable data storage device
US11361330B2 (en) 2018-08-22 2022-06-14 Bank Of America Corporation Pattern analytics system for document presentment and fulfillment

Families Citing this family (19)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
GB2417592B (en) 2004-08-13 2006-07-26 Ingenia Technology Ltd Authenticity verification of articles
GB2444139B (en) 2004-08-13 2008-11-12 Ingenia Technology Ltd Authenticity verification methods products and apparatuses
US7809156B2 (en) 2005-08-12 2010-10-05 Ricoh Company, Ltd. Techniques for generating and using a fingerprint for an article
US7731435B2 (en) 2005-08-12 2010-06-08 Ricoh Company, Ltd. Techniques for printing with integrated paper sheet identification
EP2960830B1 (en) 2005-09-05 2018-07-04 Alpvision SA Means for using microstructure of materials surface as a unique identifier
US9208394B2 (en) 2005-09-05 2015-12-08 Alpvision S.A. Authentication of an article of manufacture using an image of the microstructure of it surface
US9525547B2 (en) 2006-03-31 2016-12-20 Ricoh Company, Ltd. Transmission of media keys
US8689102B2 (en) 2006-03-31 2014-04-01 Ricoh Company, Ltd. User interface for creating and using media keys
US8554690B2 (en) 2006-03-31 2013-10-08 Ricoh Company, Ltd. Techniques for using media keys
US7865124B2 (en) 2007-03-30 2011-01-04 Ricoh Company, Ltd. Pre-scanning printer with paper fingerprinting
US8756673B2 (en) 2007-03-30 2014-06-17 Ricoh Company, Ltd. Techniques for sharing data
EP1986132A3 (en) * 2007-04-26 2009-02-18 Bowe Bell + Howell Company Apparatus, method and programmable product for identification of a document with feature analysis
GB2450131B (en) 2007-06-13 2009-05-06 Ingenia Holdings Fuzzy Keys
GB2461253B (en) 2008-05-23 2012-11-21 Ingenia Holdings Ltd Linearisation of scanned data
GB2462059A (en) * 2008-07-11 2010-01-27 Ingenia Holdings Authentication scanner
WO2011077459A2 (en) * 2009-12-23 2011-06-30 Alexia Technologies Private Limited A method of extracting naturally encrypted features from a natural surface of a product
US10482471B2 (en) 2013-01-16 2019-11-19 Amazon Technologies, Inc. Unauthorized product detection techniques
CN106682912B (en) 2015-11-10 2021-06-15 艾普维真股份有限公司 Authentication method of 3D structure
TWI734471B (en) * 2020-05-11 2021-07-21 中國信託商業銀行股份有限公司 Identity data reading system, identity data reading method, identity card system and control method thereof

Citations (85)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3877019A (en) * 1970-03-02 1975-04-08 Object Recognition Systems Photomeasuring device for computer storage of photographic and other materials
US4525748A (en) * 1982-07-30 1985-06-25 Carbone Anthony K Method and apparatus for scanning and digitizing optical images
US4537504A (en) * 1981-02-03 1985-08-27 Lgz Landis & Gyr Zug Ag Security blank with enhanced authenticating features, and a method and an apparatus for determining the genuineness of the security blank
US4544266A (en) * 1981-10-27 1985-10-01 Lgz Landis & Gyr Zug Ag Apparatus and a method for testing the authenticity of documents
US4582986A (en) * 1980-11-21 1986-04-15 Stockburger H Method and apparatus for the characteristic marking and/or identification of a data-carrier
US4754487A (en) * 1986-05-27 1988-06-28 Image Recall Systems, Inc. Picture storage and retrieval system for various limited storage mediums
US4791669A (en) * 1985-11-30 1988-12-13 Nec Corporation Encryption/decryption system
US4797921A (en) * 1984-11-13 1989-01-10 Hitachi, Ltd. System for enciphering or deciphering data
US4882764A (en) * 1985-03-29 1989-11-21 Quad/Tech, Inc. Cutoff control system
US5003596A (en) * 1989-08-17 1991-03-26 Cryptech, Inc. Method of cryptographically transforming electronic digital data from one form to another
US5058164A (en) * 1990-05-03 1991-10-15 National Semiconductor Corp. Encryption of streams of addressed information to be used for program code protection
US5060065A (en) * 1990-02-23 1991-10-22 Cimflex Teknowledge Corporation Apparatus and method for illuminating a printed circuit board for inspection
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
US5103479A (en) * 1988-04-28 1992-04-07 Hitachi Ltd. Encipher method and decipher method
US5258605A (en) * 1990-03-13 1993-11-02 Symbol Technologies, Inc. Scan generators for bar code reader using linear array of lasers
US5295196A (en) * 1990-02-05 1994-03-15 Cummins-Allison Corp. Method and apparatus for currency discrimination and counting
US5307423A (en) * 1992-06-04 1994-04-26 Digicomp Research Corporation Machine recognition of handwritten character strings such as postal zip codes or dollar amount on bank checks
US5306899A (en) * 1992-06-12 1994-04-26 Symbol Technologies, Inc. Authentication system for an item having a holographic display using a holographic record
US5475694A (en) * 1993-01-19 1995-12-12 The University Of British Columbia Fuzzy multiple signature compaction scheme for built-in self-testing of large scale digital integrated circuits
US5539840A (en) * 1993-10-19 1996-07-23 Canon Inc. Multifont optical character recognition using a box connectivity approach
US5546462A (en) * 1993-04-09 1996-08-13 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
US5781708A (en) * 1994-09-13 1998-07-14 Intermec Technology, Inc. Integral bar code printer and reader system and method of operation
US5903340A (en) * 1994-03-18 1999-05-11 Brown University Research Foundation Optically-based methods and apparatus for performing document authentication
US5912974A (en) * 1994-04-05 1999-06-15 International Business Machines Corporation Apparatus and method for authentication of printed documents
US5974150A (en) * 1997-09-30 1999-10-26 Tracer Detection Technology Corp. System and method for authentication of goods
US6193156B1 (en) * 1998-11-12 2001-02-27 Wenyu Han Method and apparatus for patterning cards, instruments and documents
US6246061B1 (en) * 1993-10-22 2001-06-12 Ut-Battelle, Llc Counterfeit-resistant materials and a method and apparatus for authenticating materials
US6328209B1 (en) * 1999-02-03 2001-12-11 American Bank Note Holographics, Inc. Card security system
US6360001B1 (en) * 2000-05-10 2002-03-19 International Business Machines Corporation Automatic location of address information on parcels sent by mass mailers
US20020041787A1 (en) * 2000-08-23 2002-04-11 Wolf Thomas Device for controlling a transport of printing products by a print-related machine
US6373573B1 (en) * 2000-03-13 2002-04-16 Lj Laboratories L.L.C. Apparatus for measuring optical characteristics of a substrate and pigments applied thereto
US6388744B1 (en) * 1999-03-23 2002-05-14 Sony Corporation Disc-shaped recording medium inspection apparatus and method
US20020105654A1 (en) * 1997-11-25 2002-08-08 Spectra Systems Corporation Optically-based system for processing banknotes based on security feature emissions
US20030002067A1 (en) * 2001-07-02 2003-01-02 Alps Electric Co., Ltd. Printer capable of invalidating a document
US6529269B1 (en) * 1999-09-28 2003-03-04 Nippon Conlux Co., Ltd. Paper sheet identification method and device
US6603874B1 (en) * 1996-11-12 2003-08-05 Robotic Vision Systems, Inc. Method and system for imaging an object or pattern
US6605819B2 (en) * 2000-04-28 2003-08-12 Ncr Corporation Media validation
US6621916B1 (en) * 1999-09-02 2003-09-16 West Virginia University Method and apparatus for determining document authenticity
US20040016810A1 (en) * 2001-03-27 2004-01-29 Nobuo Hori Card true/false decision apparatus
US20040031849A1 (en) * 2001-03-27 2004-02-19 Nobuo Hori Card true/false decision apparatus
US20040155913A1 (en) * 2002-08-12 2004-08-12 Yasuhiko Kosugi Container for printing material and detector used for container
US6798900B1 (en) * 1999-10-29 2004-09-28 Nippon Conlux Co., Ltd. Paper sheet identification method and apparatus
US6885977B2 (en) * 2002-12-20 2005-04-26 Applied Materials, Inc. System to identify a wafer manufacturing problem and method therefor
US20050110978A1 (en) * 2003-11-26 2005-05-26 Radislav Potyrailo Method of authenticating articles, authenticatable polymers, and authenticatable articles
US6902111B2 (en) * 1998-11-12 2005-06-07 Wenyu Han Method and apparatus for impeding the counterfeiting of discs
US20050135260A1 (en) * 2003-12-17 2005-06-23 International Business Machines Corporation Publish/subscribe system
US6928552B1 (en) * 1999-12-08 2005-08-09 Valentin Alexandrovich Mischenko Method and system for authentication of articles
US20050199723A1 (en) * 2001-11-30 2005-09-15 Allen Lubow Method for identifying and authenticating goods using codes, barcodes and radio frequency identification
US20060102830A1 (en) * 2000-09-19 2006-05-18 Nova Measuring Instruments, Ltd. Lateral shift measurement using an optical technique
US7077332B2 (en) * 2003-03-19 2006-07-18 Translucent Technologies, Llc Media verification system
US20060163504A1 (en) * 2003-01-23 2006-07-27 Aruze Corp. Identification sensor
US7089420B1 (en) * 2000-05-24 2006-08-08 Tracer Detection Technology Corp. Authentication method and system
US7104449B2 (en) * 1998-11-12 2006-09-12 Wenyu Han Method and apparatus for patterning cards, instruments and documents
US7110573B2 (en) * 2001-11-26 2006-09-19 Assuretec Systems, Inc. Validation and verification apparatus and method
US7119662B1 (en) * 2000-06-15 2006-10-10 Hitachi, Ltd. Service system, information processing system and interrogator
US20060256959A1 (en) * 2004-02-28 2006-11-16 Hymes Charles M Wireless communications with proximal targets identified visually, aurally, or positionally
US7152047B1 (en) * 2000-05-24 2006-12-19 Esecure.Biz, Inc. System and method for production and authentication of original documents
US20060294583A1 (en) * 2005-05-11 2006-12-28 Ingenia Holdings (U.K.) Limited Authenticity Verification
US7162035B1 (en) * 2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system
US20070036470A1 (en) * 2005-08-12 2007-02-15 Ricoh Company, Ltd. Techniques for generating and using a fingerprint for an article
US20070058037A1 (en) * 2005-05-11 2007-03-15 Optosecurity Inc. User interface for use in screening luggage, containers, parcels or people and apparatus for implementing same
US20070153269A1 (en) * 2003-05-27 2007-07-05 Hong Wang Trace chemical optical probe
US20070199047A1 (en) * 2006-02-23 2007-08-23 Rockwell Automation Technologies, Inc. Audit trail in a programmable safety instrumented system via biometric signature(s)
US7268923B2 (en) * 2003-02-28 2007-09-11 Hewlett-Packard Development Company, L.P. Document scanner for scanning books
US20070253001A1 (en) * 2003-06-25 2007-11-01 Masahiro Watanabe Three-Dimensional Shape Measuring Unit, Processing Unit, and Semiconductor Device Manufacturing Method
US7318048B1 (en) * 1999-09-07 2008-01-08 Rysix Holdings Llc Method of and system for authorizing purchases made over a computer network
US7336842B2 (en) * 2001-11-30 2008-02-26 Global Security Design, Inc. Method and apparatus for generating data representative of features of an image
US20080051033A1 (en) * 2006-08-28 2008-02-28 Charles Martin Hymes Wireless communications with visually- identified targets
US7389420B2 (en) * 2000-11-08 2008-06-17 Digimarc Corporation Content authentication and recovery using digital watermarks
US7391889B2 (en) * 2002-10-15 2008-06-24 Samsung Electronics Co., Ltd. Method and apparatus for extracting feature vector used for face recognition and retrieval
US7394573B1 (en) * 1999-04-14 2008-07-01 Xerox Corporation System for authenticating hardcopy documents
US7599963B2 (en) * 2003-05-28 2009-10-06 Fernandez Dennis S Network-extensible reconfigurable media appliance
US7599927B2 (en) * 2004-04-05 2009-10-06 Francois Lebrat & Tdf Method for searching content particularly for extracts common to two computer files
US20090254991A1 (en) * 2004-01-14 2009-10-08 International Business Machines Corporation Intrusion detection using a network processor and a parallel pattern detection engine
US7677279B2 (en) * 2007-01-31 2010-03-16 Deere & Company Delimb knife mounting arrangement for tree harvester head
US7716297B1 (en) * 2007-01-30 2010-05-11 Proofpoint, Inc. Message stream analysis for spam detection and filtering
US20100141380A1 (en) * 2007-05-08 2010-06-10 Davar Pishva Spectroscopic method and system for multi-factor biometric authentication
US20100158377A1 (en) * 2008-12-19 2010-06-24 Ingenia Holdings (Uk) Limited Authentication
US20100161529A1 (en) * 2008-12-19 2010-06-24 Ingenia Holdings (Uk) Limited Self-Calibration
US20100277446A1 (en) * 2004-12-10 2010-11-04 Polymer Vision Limited Display with reduced moire effect
US7853792B2 (en) * 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US7920714B2 (en) * 2006-07-31 2011-04-05 Canadian Bank Note Company, Limited Method and apparatus for comparing document features using texture analysis
US8009800B2 (en) * 2006-10-02 2011-08-30 Optosecurity Inc. Tray for assessing the threat status of an article at a security check point
US8078875B2 (en) * 2005-07-27 2011-12-13 Ingenia Holdings Limited Verification of authenticity
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system

Family Cites Families (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CH529395A (en) * 1971-03-23 1972-10-15 Landis & Gyr Ag Process for producing a stamp
DE2635795B2 (en) * 1975-09-09 1980-08-21 Dasy Inter S.A., Genf (Schweiz) Method and device for checking the authenticity of identification cards and similar documents
JPS5619862U (en) * 1979-07-18 1981-02-21
CH671299A5 (en) * 1987-01-23 1989-08-15 Landis & Gyr Ag
DE3809526A1 (en) * 1988-03-22 1989-10-12 Aigster Josef METHOD AND ARRANGEMENT FOR IMPROVING THE OPERATING BEHAVIOR OF THE WET PRESS OF A PAPER MACHINE
DE58909370D1 (en) * 1988-09-30 1995-09-07 Landis & Gry Tech Innovat Ag Bar code field and bar code reader.
JPH03192523A (en) * 1989-12-21 1991-08-22 Hitachi Maxell Ltd Optical information recording medium and information reproducing device
EP0883094A3 (en) * 1990-02-05 1999-06-30 Cummins-Allison Corporation Method and apparatus for currency discrimination and counting
NL9001368A (en) * 1990-06-15 1992-01-02 Tel Developments B V SECURITY OF OBJECTS OR DOCUMENTS.
US5325167A (en) * 1992-05-11 1994-06-28 Canon Research Center America, Inc. Record document authentication by microscopic grain structure and method
JPH06301840A (en) * 1993-04-10 1994-10-28 Shigetaro Muraoka Paper money discriminating method
JPH07210721A (en) * 1994-01-10 1995-08-11 Omron Corp Discrimination device for paper sheets
AU2624895A (en) * 1994-06-04 1996-01-04 De Montfort University Producing visual images
US5684707A (en) * 1994-10-03 1997-11-04 Westvaco Corporation Apparatus and method for analyzing paper surface topography
JPH08180189A (en) * 1994-12-26 1996-07-12 Toyo Commun Equip Co Ltd Method and device for deciding authenticity of paper sheet
JPH08287203A (en) * 1995-03-27 1996-11-01 Control Module Inc Method and means for safe optical discrimination
US5886798A (en) * 1995-08-21 1999-03-23 Landis & Gyr Technology Innovation Ag Information carriers with diffraction structures
JPH1063914A (en) * 1996-08-13 1998-03-06 Toshiba Corp Device for inspecting paper sheet
CH693517A5 (en) * 1997-06-06 2003-09-15 Ovd Kinegram Ag Surface pattern.
JP3604549B2 (en) * 1997-12-12 2004-12-22 グローリー工業株式会社 Paper sheet foreign matter detection device
JP3927326B2 (en) * 1998-09-11 2007-06-06 中央電子株式会社 Lot management method for people or goods using speckle pattern of laser reflected light
JP2000146952A (en) * 1998-11-10 2000-05-26 Oji Paper Co Ltd Method and device for discriminating paper
GB9901522D0 (en) * 1999-01-26 1999-03-17 Bank Of England Substrates for printing
GB9901523D0 (en) * 1999-01-26 1999-03-17 Bank Of England Printing of security documents
JP2002092682A (en) * 2000-08-30 2002-03-29 Internatl Business Mach Corp <Ibm> Method and system of detecting watermark
FR2817356B1 (en) * 2000-11-10 2003-06-27 Atys INVISIBLE MARKING AND SPECIFIC READING DEVICE
KR200251110Y1 (en) * 2001-07-05 2001-11-16 박경진 Cable band
NL1018485C2 (en) * 2001-07-06 2003-01-08 Nl Bank Nv Series of value documents with a watermark in the form of a barcode.
JP3921073B2 (en) * 2001-10-31 2007-05-30 日本電産サンキョー株式会社 Paper sheet identification device
GB2393059A (en) * 2002-08-20 2004-03-17 Ian Russell Christie-Miller Imaging of paper by transmitted and reflected light
JP4265180B2 (en) * 2002-09-09 2009-05-20 富士ゼロックス株式会社 Paper identification verification device
ES2283498T3 (en) * 2002-11-08 2007-11-01 European Central Bank INSERTION OF A WATER BRAND IN A SAFETY DOCUMENT.
GB2411954B (en) * 2004-03-12 2006-08-09 Ingenia Technology Ltd Authenticity verification methods,products and apparatuses
BRPI0508635A (en) * 2004-03-12 2007-08-07 Ingenia Technology Ltd printing device, and apparatus and methods for creating authenticable articles and for verifying the authenticity of articles
DE102004033664A1 (en) * 2004-07-12 2006-02-16 Hueck Folien Gmbh & Co. Kg Rotary rotogravure molds for the production of security features, processes for their production and products produced using these gravure molds and their use
GB2444139B (en) 2004-08-13 2008-11-12 Ingenia Technology Ltd Authenticity verification methods products and apparatuses

Patent Citations (87)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US3877019A (en) * 1970-03-02 1975-04-08 Object Recognition Systems Photomeasuring device for computer storage of photographic and other materials
US4582986A (en) * 1980-11-21 1986-04-15 Stockburger H Method and apparatus for the characteristic marking and/or identification of a data-carrier
US4537504A (en) * 1981-02-03 1985-08-27 Lgz Landis & Gyr Zug Ag Security blank with enhanced authenticating features, and a method and an apparatus for determining the genuineness of the security blank
US4544266A (en) * 1981-10-27 1985-10-01 Lgz Landis & Gyr Zug Ag Apparatus and a method for testing the authenticity of documents
US4525748A (en) * 1982-07-30 1985-06-25 Carbone Anthony K Method and apparatus for scanning and digitizing optical images
US4797921A (en) * 1984-11-13 1989-01-10 Hitachi, Ltd. System for enciphering or deciphering data
US4882764A (en) * 1985-03-29 1989-11-21 Quad/Tech, Inc. Cutoff control system
US4791669A (en) * 1985-11-30 1988-12-13 Nec Corporation Encryption/decryption system
US4754487A (en) * 1986-05-27 1988-06-28 Image Recall Systems, Inc. Picture storage and retrieval system for various limited storage mediums
US5103479A (en) * 1988-04-28 1992-04-07 Hitachi Ltd. Encipher method and decipher method
US5003596A (en) * 1989-08-17 1991-03-26 Cryptech, Inc. Method of cryptographically transforming electronic digital data from one form to another
US5081675A (en) * 1989-11-13 1992-01-14 Kitti Kittirutsunetorn System for protection of software in memory against unauthorized use
US5295196A (en) * 1990-02-05 1994-03-15 Cummins-Allison Corp. Method and apparatus for currency discrimination and counting
US5060065A (en) * 1990-02-23 1991-10-22 Cimflex Teknowledge Corporation Apparatus and method for illuminating a printed circuit board for inspection
US5258605A (en) * 1990-03-13 1993-11-02 Symbol Technologies, Inc. Scan generators for bar code reader using linear array of lasers
US5058164A (en) * 1990-05-03 1991-10-15 National Semiconductor Corp. Encryption of streams of addressed information to be used for program code protection
US5307423A (en) * 1992-06-04 1994-04-26 Digicomp Research Corporation Machine recognition of handwritten character strings such as postal zip codes or dollar amount on bank checks
US5306899A (en) * 1992-06-12 1994-04-26 Symbol Technologies, Inc. Authentication system for an item having a holographic display using a holographic record
US5475694A (en) * 1993-01-19 1995-12-12 The University Of British Columbia Fuzzy multiple signature compaction scheme for built-in self-testing of large scale digital integrated circuits
US5546462A (en) * 1993-04-09 1996-08-13 Washington University Method and apparatus for fingerprinting and authenticating various magnetic media
US5539840A (en) * 1993-10-19 1996-07-23 Canon Inc. Multifont optical character recognition using a box connectivity approach
US6246061B1 (en) * 1993-10-22 2001-06-12 Ut-Battelle, Llc Counterfeit-resistant materials and a method and apparatus for authenticating materials
US5903340A (en) * 1994-03-18 1999-05-11 Brown University Research Foundation Optically-based methods and apparatus for performing document authentication
US5912974A (en) * 1994-04-05 1999-06-15 International Business Machines Corporation Apparatus and method for authentication of printed documents
US5781708A (en) * 1994-09-13 1998-07-14 Intermec Technology, Inc. Integral bar code printer and reader system and method of operation
US6603874B1 (en) * 1996-11-12 2003-08-05 Robotic Vision Systems, Inc. Method and system for imaging an object or pattern
US5974150A (en) * 1997-09-30 1999-10-26 Tracer Detection Technology Corp. System and method for authentication of goods
US20020105654A1 (en) * 1997-11-25 2002-08-08 Spectra Systems Corporation Optically-based system for processing banknotes based on security feature emissions
US6193156B1 (en) * 1998-11-12 2001-02-27 Wenyu Han Method and apparatus for patterning cards, instruments and documents
US7104449B2 (en) * 1998-11-12 2006-09-12 Wenyu Han Method and apparatus for patterning cards, instruments and documents
US6902111B2 (en) * 1998-11-12 2005-06-07 Wenyu Han Method and apparatus for impeding the counterfeiting of discs
US6328209B1 (en) * 1999-02-03 2001-12-11 American Bank Note Holographics, Inc. Card security system
US6388744B1 (en) * 1999-03-23 2002-05-14 Sony Corporation Disc-shaped recording medium inspection apparatus and method
US7394573B1 (en) * 1999-04-14 2008-07-01 Xerox Corporation System for authenticating hardcopy documents
US6621916B1 (en) * 1999-09-02 2003-09-16 West Virginia University Method and apparatus for determining document authenticity
US7318048B1 (en) * 1999-09-07 2008-01-08 Rysix Holdings Llc Method of and system for authorizing purchases made over a computer network
US6529269B1 (en) * 1999-09-28 2003-03-04 Nippon Conlux Co., Ltd. Paper sheet identification method and device
US6798900B1 (en) * 1999-10-29 2004-09-28 Nippon Conlux Co., Ltd. Paper sheet identification method and apparatus
US6928552B1 (en) * 1999-12-08 2005-08-09 Valentin Alexandrovich Mischenko Method and system for authentication of articles
US6373573B1 (en) * 2000-03-13 2002-04-16 Lj Laboratories L.L.C. Apparatus for measuring optical characteristics of a substrate and pigments applied thereto
US6605819B2 (en) * 2000-04-28 2003-08-12 Ncr Corporation Media validation
US6360001B1 (en) * 2000-05-10 2002-03-19 International Business Machines Corporation Automatic location of address information on parcels sent by mass mailers
US7773749B1 (en) * 2000-05-24 2010-08-10 Tracer Detection Technology Corp. Authentication method and system
US7162035B1 (en) * 2000-05-24 2007-01-09 Tracer Detection Technology Corp. Authentication method and system
US7152047B1 (en) * 2000-05-24 2006-12-19 Esecure.Biz, Inc. System and method for production and authentication of original documents
US8270603B1 (en) * 2000-05-24 2012-09-18 Tracer Detection Technology Corp. Authentication method and system
US7089420B1 (en) * 2000-05-24 2006-08-08 Tracer Detection Technology Corp. Authentication method and system
US7119662B1 (en) * 2000-06-15 2006-10-10 Hitachi, Ltd. Service system, information processing system and interrogator
US20020041787A1 (en) * 2000-08-23 2002-04-11 Wolf Thomas Device for controlling a transport of printing products by a print-related machine
US20060102830A1 (en) * 2000-09-19 2006-05-18 Nova Measuring Instruments, Ltd. Lateral shift measurement using an optical technique
US7389420B2 (en) * 2000-11-08 2008-06-17 Digimarc Corporation Content authentication and recovery using digital watermarks
US20040031849A1 (en) * 2001-03-27 2004-02-19 Nobuo Hori Card true/false decision apparatus
US20040016810A1 (en) * 2001-03-27 2004-01-29 Nobuo Hori Card true/false decision apparatus
US20030002067A1 (en) * 2001-07-02 2003-01-02 Alps Electric Co., Ltd. Printer capable of invalidating a document
US7110573B2 (en) * 2001-11-26 2006-09-19 Assuretec Systems, Inc. Validation and verification apparatus and method
US20050199723A1 (en) * 2001-11-30 2005-09-15 Allen Lubow Method for identifying and authenticating goods using codes, barcodes and radio frequency identification
US7336842B2 (en) * 2001-11-30 2008-02-26 Global Security Design, Inc. Method and apparatus for generating data representative of features of an image
US20040155913A1 (en) * 2002-08-12 2004-08-12 Yasuhiko Kosugi Container for printing material and detector used for container
US8171567B1 (en) * 2002-09-04 2012-05-01 Tracer Detection Technology Corp. Authentication method and system
US7391889B2 (en) * 2002-10-15 2008-06-24 Samsung Electronics Co., Ltd. Method and apparatus for extracting feature vector used for face recognition and retrieval
US6885977B2 (en) * 2002-12-20 2005-04-26 Applied Materials, Inc. System to identify a wafer manufacturing problem and method therefor
US20060163504A1 (en) * 2003-01-23 2006-07-27 Aruze Corp. Identification sensor
US7268923B2 (en) * 2003-02-28 2007-09-11 Hewlett-Packard Development Company, L.P. Document scanner for scanning books
US7077332B2 (en) * 2003-03-19 2006-07-18 Translucent Technologies, Llc Media verification system
US20070153269A1 (en) * 2003-05-27 2007-07-05 Hong Wang Trace chemical optical probe
US7599963B2 (en) * 2003-05-28 2009-10-06 Fernandez Dennis S Network-extensible reconfigurable media appliance
US20070253001A1 (en) * 2003-06-25 2007-11-01 Masahiro Watanabe Three-Dimensional Shape Measuring Unit, Processing Unit, and Semiconductor Device Manufacturing Method
US20050110978A1 (en) * 2003-11-26 2005-05-26 Radislav Potyrailo Method of authenticating articles, authenticatable polymers, and authenticatable articles
US20050135260A1 (en) * 2003-12-17 2005-06-23 International Business Machines Corporation Publish/subscribe system
US20090254991A1 (en) * 2004-01-14 2009-10-08 International Business Machines Corporation Intrusion detection using a network processor and a parallel pattern detection engine
US20060256959A1 (en) * 2004-02-28 2006-11-16 Hymes Charles M Wireless communications with proximal targets identified visually, aurally, or positionally
US7853792B2 (en) * 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US7599927B2 (en) * 2004-04-05 2009-10-06 Francois Lebrat & Tdf Method for searching content particularly for extracts common to two computer files
US20100277446A1 (en) * 2004-12-10 2010-11-04 Polymer Vision Limited Display with reduced moire effect
US20060294583A1 (en) * 2005-05-11 2006-12-28 Ingenia Holdings (U.K.) Limited Authenticity Verification
US20070058037A1 (en) * 2005-05-11 2007-03-15 Optosecurity Inc. User interface for use in screening luggage, containers, parcels or people and apparatus for implementing same
US8078875B2 (en) * 2005-07-27 2011-12-13 Ingenia Holdings Limited Verification of authenticity
US20070036470A1 (en) * 2005-08-12 2007-02-15 Ricoh Company, Ltd. Techniques for generating and using a fingerprint for an article
US20070199047A1 (en) * 2006-02-23 2007-08-23 Rockwell Automation Technologies, Inc. Audit trail in a programmable safety instrumented system via biometric signature(s)
US7920714B2 (en) * 2006-07-31 2011-04-05 Canadian Bank Note Company, Limited Method and apparatus for comparing document features using texture analysis
US20080051033A1 (en) * 2006-08-28 2008-02-28 Charles Martin Hymes Wireless communications with visually- identified targets
US8009800B2 (en) * 2006-10-02 2011-08-30 Optosecurity Inc. Tray for assessing the threat status of an article at a security check point
US7716297B1 (en) * 2007-01-30 2010-05-11 Proofpoint, Inc. Message stream analysis for spam detection and filtering
US7677279B2 (en) * 2007-01-31 2010-03-16 Deere & Company Delimb knife mounting arrangement for tree harvester head
US20100141380A1 (en) * 2007-05-08 2010-06-10 Davar Pishva Spectroscopic method and system for multi-factor biometric authentication
US20100161529A1 (en) * 2008-12-19 2010-06-24 Ingenia Holdings (Uk) Limited Self-Calibration
US20100158377A1 (en) * 2008-12-19 2010-06-24 Ingenia Holdings (Uk) Limited Authentication

Cited By (36)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US9818249B1 (en) 2002-09-04 2017-11-14 Copilot Ventures Fund Iii Llc Authentication method and system
US8699088B2 (en) 2004-03-12 2014-04-15 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
US8757493B2 (en) 2004-03-12 2014-06-24 Ingenia Holdings Limited System and method for article authentication using encoded signatures
US8766800B2 (en) 2004-03-12 2014-07-01 Ingenia Holdings Limited Authenticity verification methods, products, and apparatuses
US7853792B2 (en) 2004-03-12 2010-12-14 Ingenia Holdings Limited Authenticity verification methods, products and apparatuses
US8749386B2 (en) 2004-03-12 2014-06-10 Ingenia Holdings Limited System and method for article authentication using signatures
US8502668B2 (en) 2004-03-12 2013-08-06 Ingenia Holdings Limited System and method for article authentication using blanket illumination
US8896885B2 (en) 2004-03-12 2014-11-25 Ingenia Holdings Limited Creating authenticatable printed articles and subsequently verifying them based on scattered light caused by surface structure
US8421625B2 (en) 2004-03-12 2013-04-16 Ingenia Holdings Limited System and method for article authentication using thumbnail signatures
US9019567B2 (en) 2004-03-12 2015-04-28 Ingenia Holdings Limited Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them
US8078875B2 (en) 2005-07-27 2011-12-13 Ingenia Holdings Limited Verification of authenticity
US7812935B2 (en) 2005-12-23 2010-10-12 Ingenia Holdings Limited Optical authentication
US20100316251A1 (en) * 2005-12-23 2010-12-16 Ingenia Holdings Limited Optical Authentication
US8497983B2 (en) 2005-12-23 2013-07-30 Ingenia Holdings Limited Optical authentication
US8224018B2 (en) 2006-01-23 2012-07-17 Digimarc Corporation Sensing data from physical objects
US8983117B2 (en) 2006-01-23 2015-03-17 Digimarc Corporation Document processing methods
US8923550B2 (en) 2006-01-23 2014-12-30 Digimarc Corporation Object processing employing movement
US20070187505A1 (en) * 2006-01-23 2007-08-16 Rhoads Geoffrey B Capturing Physical Feature Data
US8077905B2 (en) 2006-01-23 2011-12-13 Digimarc Corporation Capturing physical feature data
US20080112596A1 (en) * 2006-01-23 2008-05-15 Rhoads Geoffrey B Sensing Data From Physical Objects
US20070211920A1 (en) * 2006-01-23 2007-09-13 Rhoads Geoffrey B Methods and Cards Employing Optical Phenomena
US8842876B2 (en) 2006-01-23 2014-09-23 Digimarc Corporation Sensing data from physical objects
US8215553B2 (en) 2006-11-15 2012-07-10 Digimarc Corporation Physical credentials and related methods
US20080121708A1 (en) * 2006-11-15 2008-05-29 Rhoads Geoffrey B Physical Credentials and Related Methods
US8682076B2 (en) 2008-12-19 2014-03-25 Ingenia Holdings Limited Signature generation for use in authentication and verification using a non-coherent radiation source
US8615475B2 (en) 2008-12-19 2013-12-24 Ingenia Holdings Limited Self-calibration
US8892556B2 (en) 2009-11-10 2014-11-18 Ingenia Holdings Limited Optimisation
US11025620B2 (en) 2011-10-27 2021-06-01 Electronic Warfare Associates, Inc. Systems and methods of device authentication including features of circuit testing and verification in connection with known board information
US9165133B2 (en) 2011-10-27 2015-10-20 Electronic Warfare Associates, Inc. Systems and methods of device authentication including features of circuit testing and verification in connection with known board information
WO2013063393A1 (en) * 2011-10-27 2013-05-02 Electronic Warfare Associates, Inc. Systems and methods of device authentication including features of circuit testing and verification in connection with known board information
US11126902B2 (en) * 2014-06-03 2021-09-21 IE-9 Technology Corp. Optically variable data storage device
US9871660B2 (en) * 2014-12-23 2018-01-16 Banco De Mexico Method for certifying and authentifying security documents based on a measure of the relative variations of the different processes involved in its manufacture
US10606536B2 (en) 2018-08-17 2020-03-31 Bank Of America Corporation Intelligent systematic physical document fulfillment system
US11025641B2 (en) 2018-08-21 2021-06-01 Bank Of America Corporation System for optimizing access control for server privilege
US11087323B2 (en) 2018-08-21 2021-08-10 Bank Of America Corporation Exposure based secure access system
US11361330B2 (en) 2018-08-22 2022-06-14 Bank Of America Corporation Pattern analytics system for document presentment and fulfillment

Also Published As

Publication number Publication date
CN101031927A (en) 2007-09-05
GB0708961D0 (en) 2007-06-20
WO2006016112A1 (en) 2006-02-16
JP5289602B2 (en) 2013-09-11
MX2007001856A (en) 2007-04-27
NO20071360L (en) 2007-04-27
RU2391702C2 (en) 2010-06-10
KR20070044050A (en) 2007-04-26
GB0720673D0 (en) 2007-12-05
IL181254A0 (en) 2007-07-04
GB2444139A (en) 2008-05-28
GB2438424A (en) 2007-11-28
BRPI0514334A (en) 2008-06-10
AR050781A1 (en) 2006-11-22
GB2417074B (en) 2007-11-21
AU2005271022A1 (en) 2006-02-16
CN101031927B (en) 2012-05-30
TW200606736A (en) 2006-02-16
GB2444139B (en) 2008-11-12
GB2438424B (en) 2008-02-13
JP2008509497A (en) 2008-03-27
GB0418178D0 (en) 2004-09-15
JP2012178181A (en) 2012-09-13
HK1086925A1 (en) 2006-09-29
EP1784757A1 (en) 2007-05-16
EP1784757B1 (en) 2012-10-17
ZA200701258B (en) 2009-09-30
CA2576942A1 (en) 2006-02-16
GB2417074A (en) 2006-02-15
RU2007109066A (en) 2008-09-20

Similar Documents

Publication Publication Date Title
EP1784757B1 (en) Authenticity verification methods, products and apparatuses
EP1730675B1 (en) Authenticity verification methods, products and apparatuses
US8103046B2 (en) Authenticity verification of articles using a database
US9019567B2 (en) Methods and apparatuses for creating authenticatable printed articles and subsequently verifying them

Legal Events

Date Code Title Description
AS Assignment

Owner name: INGENIA HOLDINGS LIMITED, VIRGIN ISLANDS, BRITISH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:COWBURN, RUSSELL PAUL;REEL/FRAME:027209/0310

Effective date: 20110913

Owner name: INGENIA HOLDINGS LIMITED, VIRGIN ISLANDS, BRITISH

Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNOR:COWBURN, RUSSELL PAUL;REEL/FRAME:027209/0775

Effective date: 20110913

STCB Information on status: application discontinuation

Free format text: ABANDONED -- FAILURE TO RESPOND TO AN OFFICE ACTION